adc1f1c3c12a41d88b070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) r2 = socket$inet6(0xa, 0x803, 0xff) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0xfffffffffffff000}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x19, &(0x7f0000000080)=0x8001, 0x4) sendto(r0, &(0x7f0000000280)="04836cb62db1cf0ee9ad9ee9038a4bb9b77fe7dbcd07a71afcff7d8bb63b1cdc78b3db68832b953272d3dfac22b2d5fd7e4880e1ab21a43f9ea09c319194c30276a224c4fc27716d082a268ea9370b303788da2963a02afed8c1f6a8844f464f7381fe57cd93c6db884d75c554973e5296566d069a206e4a56cbb54725c2f9485ed3e74960c5df71f913a6bd98f055bef51c6d14a669f0e6286e41ff67ccec92c6a657bb43313bbceb5e314e98eeff3be38dfb040d203496e61e9e4b5e63a622b2294c33d1d99827b2493af414b2704f7eee5dcb19bea6fc168ba1", 0xdb, 0x20000004, 0x0, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r3, 0x1, &(0x7f0000000380)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0}]) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000000c0)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(r4, 0x7006) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x2000) 20:18:42 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) r1 = socket$inet6(0xa, 0x1000000001, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) 20:18:43 executing program 0: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xc000, 0x0) r1 = inotify_init() unshare(0x400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r2 = inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x80000003) inotify_rm_watch(r1, r2) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000040)={0x3f, 0x80, 0xffffffffffffff3d}) exit_group(0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x400000000000) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000000c0)) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 20:18:44 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) 20:18:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000001c0)="ab") ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0xffffffffffffffff, 0x3, 0xfffffffffffffffc, 0x3, 0x6}) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) madvise(&(0x7f0000000000/0x600000)=nil, 0x602000, 0x3) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x23) 20:18:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x100000000000, 0x5a4b, @loopback}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="28000000000000002900000043000000736f9355754d2527eb1a4f793004000000c947c92280ab07"], 0x28}, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x2ac, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x4e23, @multicast2}}) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000001c0)) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x10001) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000380)={@loopback, @rand_addr="315fc686ba6d330e5051b37c91589ed3", @loopback, 0x9, 0x4, 0x0, 0x100, 0xfffffffffffffffc, 0x80000000, r3}) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x6000, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x11) write$P9_RWALK(r2, &(0x7f0000000140)={0x71, 0x6f, 0x1, {0x8, [{0x58, 0x1, 0x1}, {0x3, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x1, 0x4}, {0xa8, 0x0, 0x6}, {0x8, 0x2, 0x5}, {0x0, 0x4, 0x6}, {0x0, 0x2, 0x3}]}}, 0x71) 20:18:44 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0xbb) recvmmsg(r1, &(0x7f00000001c0), 0x11a, 0x20, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f00000007c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@multicast1}}, &(0x7f0000000a40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000a80)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000b80)=0xe8) getgroups(0x2, &(0x7f0000000bc0)=[0xffffffffffffffff, 0x0]) r12 = getgid() stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = getgid() lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000e80)={{}, {0x1, 0x2}, [{0x2, 0x1, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}, {0x2, 0x3, r5}, {0x2, 0x7, r6}, {0x2, 0x2, r7}, {0x2, 0x2, r8}, {0x2, 0x6, r9}, {0x2, 0x3, r10}], {0x4, 0x1}, [{0x8, 0x4, r11}, {0x8, 0x1, r12}, {0x8, 0x0, r13}, {0x8, 0x2, r14}, {0x8, 0x3, r15}, {0x8, 0x2, r16}, {0x8, 0x4, r17}], {0x10, 0x2}, {0x20, 0x2}}, 0xa4, 0x2) io_setup(0x8, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x41e, 0x0) 20:18:44 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="6cb77bda6f0b1498d0401df5d9f3c314709f9870760611ccefd2be47fb1b6a69ebb8f73ae375323cf5d3b06a060000000035cf139bc6cd63"], 0x1) write$P9_RMKNOD(r0, &(0x7f0000000000)={0xfffffffffffffdab}, 0xffb3) 20:18:44 executing program 0: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="052fc7547570ec523ca67775c5418889206e112d5c9dfba56e9136a3d0d056b00040ef732487b9283becb2271c1b130400000000999705af7c"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ptrace$cont(0x7, r0, 0x0, 0x0) 20:18:44 executing program 5: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) pivot_root(0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)={0x2dc, r1, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe0b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0xc0, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7720}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x21200fac}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x60f}]}, @TIPC_NLA_LINK={0xe0, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2765}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4000000000000000}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2a}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x53b25b8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfc}]}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x2dc}}, 0x800) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) write$selinux_create(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a61725f63616368655f743a73d076b1a1a78730202f7573722f7362696e2f637570736420303030303030"], 0x3c) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@local, @in6=@local, 0x4e20, 0x8, 0x4e23, 0x4, 0xa, 0x20, 0x0, 0x2b, 0x0, r4}, {0x2, 0xb4, 0x40, 0x1, 0x400, 0x1, 0xbd, 0x7ff}, {0x4, 0x3ff, 0xfffffffffffffff8, 0xfff}, 0x1000, 0x0, 0x0, 0x1, 0x3, 0x2}, {{@in6=@local, 0x4d4, 0x7e}, 0xa, @in=@local, 0x3505, 0x6, 0x2, 0xb6, 0x9, 0x7fff, 0x15}}, 0xe8) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r5, 0x0, 0x9219) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24}, {0x1}, 0x0, {0x2, 0x4e24, @remote}, 'ip6_vti0\x00'}) [ 1198.743386] kauditd_printk_skb: 164 callbacks suppressed [ 1198.743395] audit: type=1400 audit(1554668324.945:48594): avc: denied { map } for pid=26383 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.870530] audit: type=1400 audit(1554668324.945:48595): avc: denied { map } for pid=26383 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1199.021402] audit: type=1400 audit(1554668324.955:48596): avc: denied { map } for pid=26383 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1199.197857] audit: type=1400 audit(1554668324.965:48597): avc: denied { map } for pid=26383 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:18:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x2400, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) r2 = gettid() ptrace$poke(0x5, r2, &(0x7f0000000140), 0x84) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040)=0x5, 0x4) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000180)={0x0, 0x1, {0x200, 0x7, 0xf, 0x11, 0x6, 0x8, 0x1, 0x8f, 0xffffffffffffffff}}) sendmsg(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff8e, &(0x7f00000000c0)}, 0xfffffffffffffffe) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x80000, 0x0) ioctl$PPPIOCATTACH(r4, 0x4004743d, &(0x7f0000000100)=0x4) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000200)) 20:18:45 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x800) 20:18:45 executing program 0: r0 = open$dir(&(0x7f0000000340)='./file0\x00', 0x3, 0x4) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000380)={0x8, 0x1, 0x7, 0x101b, 0xa, [{0x32ea, 0x9, 0x2, 0x0, 0x0, 0x1800}, {0x8, 0x6, 0x834e, 0x0, 0x0, 0x400}, {0x6, 0x7, 0xff, 0x0, 0x0, 0x805}, {0x8, 0x515d, 0x2, 0x0, 0x0, 0x400}, {0x7fffffff, 0x9412, 0xffffffffffffffff, 0x0, 0x0, 0x1204}, {0x1309, 0x8, 0x7ff, 0x0, 0x0, 0x2000}, {0x96, 0x8, 0x1, 0x0, 0x0, 0x2000}, {0x7ff, 0x3eb0, 0x3f, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x20, 0x0, 0x0, 0x4}, {0x0, 0xa443, 0x158f}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = gettid() fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000080)) clone(0x804007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000700)=0x8, 0x4) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r3 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x3) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f00000000c0)=0x100000001) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$BLKBSZSET(r4, 0x40081271, &(0x7f0000000640)=0x8) tkill(0x0, 0x16) write(r3, &(0x7f00000006c0)="bce1d12b9fe0e66c0026879ddfd6b49f9c2dd83ec9864d56c0fab69ae30d", 0x1e) ptrace(0x10, r2) write$P9_RUNLINKAT(r4, &(0x7f0000000680)={0x7, 0x4d, 0x1}, 0x7) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x5, 0x5, 0x49d5, 0x0, 0x94000000}) [ 1199.391572] audit: type=1400 audit(1554668325.015:48598): avc: denied { map } for pid=26383 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1199.557260] audit: type=1400 audit(1554668325.045:48599): avc: denied { map } for pid=26383 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1199.716168] audit: type=1400 audit(1554668325.055:48600): avc: denied { map } for pid=26383 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:18:46 executing program 2: io_setup(0x5, &(0x7f0000000000)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x4, 0x7, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f00000000c0)=0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x80045439, 0x0) [ 1199.897754] audit: type=1400 audit(1554668325.095:48601): avc: denied { map } for pid=26383 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:18:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getgid() io_setup(0x0, 0x0) r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001200)="24000000220007031dfffd946f610500000000000500000000000000421baba20400ff7e280000001100ffffba16a0aa1c09000000000000eff24d8238cfa47e23f7efbfcd3d2929e9c6eeda", 0x4c}], 0x1}, 0x0) 20:18:46 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0xffffffffffff275d, 0x80000000}, @window={0x3, 0x8001, 0x3}, @mss={0x2, 0x382}, @window={0x3, 0x7ff, 0xfffffffffffff7e7}, @timestamp], 0x5) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 20:18:46 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="010029bd7000fcdbdf2502000000c800010038000400200001000a004e22ffffff0000000000000000000000000000000001000000001400020002004e20e000000200000000000000000800030000c00000380004001400010002004e23000000000000000000000000200002000a004e2200000006fe880000000000000000000000000101ff03000014000200080002000900000008000400000000000c00020008000300117900002400020008000200109af22f080001001a000000080001000600000008000400040000000800030000000000"], 0xdc}, 0x1, 0x0, 0x0, 0x4000}, 0x800) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:sudo_exec_t:s0\x00', 0x21, 0x0) [ 1200.088818] audit: type=1400 audit(1554668325.105:48602): avc: denied { map } for pid=26383 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1200.239551] audit: type=1400 audit(1554668325.165:48603): avc: denied { map } for pid=26383 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1200.627162] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:18:46 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) flistxattr(r0, &(0x7f0000000040)=""/62, 0x3e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000140)="385851e2e8a84db494f984210ed473c27537c7e41bb9d73695b7ab652900643ef2c116f59563476181c5e3af88937c7b7aeba92891d9533066f3f90b7deccfa95d5e247ab22934f926b89203557d30f05c6e5f52617ec524b4ee713566fc0374dec2200c3f8cb1b3f48d37d702fc3e6b34b9818844548c25250db2ca9c32cd54acb3a3606dbba36a09226830bee3b5a4ba1ffaf43259c8ca513b8af9decbb22e46043b95f8a7c1d68ec8dededccce0") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r2, 0x80045439, 0x0) [ 1200.959032] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=55597 sclass=netlink_route_socket pig=26441 comm=syz-executor.5 [ 1201.110473] ip6_tunnel: l0 xmit: Local address not yet configured! [ 1201.381225] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=55597 sclass=netlink_route_socket pig=26439 comm=syz-executor.5 20:18:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000140)) 20:18:47 executing program 4: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, 0xfffffffffffffffe) prctl$PR_SET_UNALIGN(0x6, 0x1) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x100) write$P9_RSTAT(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x74) flistxattr(r1, &(0x7f0000000140)=""/52, 0x34) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000100)=r1) 20:18:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0229f40000000000000000000000000086d6a8a1b4a580964b95d7ff33e22a1489adefaaa7b3417672c7f809ab16420175110395b3bc527e"]}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r4, 0x0, 0x1000) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f00000004c0)={0x1, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}, {{0x2, 0x4e20, @rand_addr=0x3}}}, 0x108) r5 = memfd_create(&(0x7f0000000000)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x2) gettid() ftruncate(r5, 0x40001) sendfile(r3, r5, 0x0, 0x100000000002) creat(&(0x7f0000000200)='./file0\x00', 0x20) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000380)=""/209) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000480)=0x5) fcntl$addseals(r5, 0x409, 0x8) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) dup2(r5, r4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000c05001a000800f6e527b1c506a8c16f00000000000000000000ffff305add01000000ff00000000"], 0x37}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000238, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000280)=""/227) 20:18:47 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xee6a, 0x100000000, 0x0, 0x1, 0x0, 0x0, 0x180, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffff008c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x9, 0x3}, 0x2c400, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="ba00feff3d95b60a95502e14bf6c9a01000000000000006c47b83f861f6a84c74c", @ANYRES16=r1, @ANYBLOB="000326bd7000fedbdf2503000000380005000400020008000100696200000800010075647000040002000c00020008000300ffffffff080001006962000008000100657468000400020070000500080001006962000008000100756470004c0002000800020001000000080002000000000008000300feffffff08000100030000000800040004000000080002000000000008000200ff07000008000300a60000000800020001000000080001007564700008000100657468004000070008000200fdffffff0c000300020000000000000008000200706d000008000100ff0f00000c000300a8baffffffffffff0c0003000000000000000000680007000c000300ff070000000000000c000400000000000000000008000100010000000c000300a8030000000000000c00040005000000000000000c00030000000000000000000c000400070000000000000008000100060000000c00040005000000000000002000020004000400080002000800000004000400080001000000000004000400"], 0x188}, 0x1, 0x0, 0x0, 0x4040000}, 0x40000) mlockall(0x2) 20:18:47 executing program 3: prctl$PR_CAP_AMBIENT(0x2f, 0x7, 0x20) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) clock_gettime(0x7, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={r1, r2/1000+30000}, 0x10) 20:18:47 executing program 5: r0 = socket(0x10, 0x100000000002, 0x6) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3fb85f0f}, {&(0x7f00000000c0)=""/85, 0xa83}, {&(0x7f00000024c0)=""/4096, 0x1034}, {&(0x7f0000000180)=""/120, 0x7e}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x8a}, {&(0x7f0000000200)=""/22, 0x2ed}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 20:18:48 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x3) dup3(r0, r1, 0x0) 20:18:48 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8a) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) [ 1201.883921] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1201.990313] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'. 20:18:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x0) 20:18:48 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40800, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) 20:18:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f00000000c0), 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:18:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/44, 0x2c}, {0x0}, {0x0}, {&(0x7f0000000400)=""/73, 0x49}, {&(0x7f00000005c0)=""/154, 0x9a}, {&(0x7f0000000680)=""/167, 0xa7}], 0x6, 0x0) 20:18:48 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000002c0), 0xfd65) recvmmsg(r1, &(0x7f0000006500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) 20:18:49 executing program 2: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000080)={'syz1', "85bc9d9b1d9b"}, 0xa) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x80045439, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x20) [ 1203.752547] kauditd_printk_skb: 213 callbacks suppressed [ 1203.752557] audit: type=1400 audit(1554668329.955:48817): avc: denied { map } for pid=26514 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.813575] audit: type=1400 audit(1554668329.955:48818): avc: denied { map } for pid=26514 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.867433] audit: type=1400 audit(1554668329.955:48819): avc: denied { map } for pid=26514 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.890214] audit: type=1400 audit(1554668329.955:48820): avc: denied { map } for pid=26514 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.915642] audit: type=1400 audit(1554668329.955:48821): avc: denied { map } for pid=26514 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.940423] audit: type=1400 audit(1554668329.955:48822): avc: denied { map } for pid=26514 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.964679] audit: type=1400 audit(1554668329.955:48823): avc: denied { map } for pid=26514 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.988907] audit: type=1400 audit(1554668329.985:48824): avc: denied { map } for pid=26514 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1204.028446] audit: type=1400 audit(1554668329.985:48825): avc: denied { map } for pid=26514 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:18:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000000c0)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) 20:18:50 executing program 1: syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 20:18:50 executing program 0: keyctl$dh_compute(0x17, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, [0x2]}) 20:18:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/44, 0x2c}, {&(0x7f0000000040)=""/191, 0xbf}, {&(0x7f0000000100)=""/106, 0x6a}, {&(0x7f0000000200)=""/228, 0xe4}, {&(0x7f0000000400)=""/73, 0x49}, {0x0}, {&(0x7f0000000540)=""/117, 0x75}], 0x7, 0x0) 20:18:50 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000003400)) 20:18:50 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0xcdea) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000140)={0x20000000400000, {{0x2, 0x4e24, @rand_addr=0x7}}, 0x1, 0x9, [{{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xe}}}, {{0x2, 0x4e20, @local}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @local}}, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}}, {{0x2, 0x4e21, @multicast1}}]}, 0x510) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000700)=0x5) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x40, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') r4 = getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x7, 0xff, 0x80000000, 0x0, 0x0, 0x5, 0x44126, 0xa, 0x0, 0x6, 0x1f, 0x100, 0x3f, 0x5, 0x9, 0xc6a, 0x1d0, 0xfffffffffffffff9, 0x1, 0x4, 0x3, 0x2, 0x5, 0x5, 0xfff, 0xc78, 0x8, 0x5, 0x5, 0x7, 0xcf9, 0x80000000, 0x3, 0x100000001, 0x9, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xffffffffffffffff, 0x3}, 0x8380, 0x3, 0x40, 0x9, 0x5, 0x92c, 0x7}, r4, 0xe, r2, 0x9) utime(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0xffffffff}) ioctl$TCXONC(r3, 0x80045439, 0x0) 20:18:50 executing program 1: 20:18:50 executing program 4: 20:18:50 executing program 3: 20:18:50 executing program 5: [ 1204.626337] audit: type=1400 audit(1554668330.825:48826): avc: denied { create } for pid=26517 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:18:51 executing program 0: 20:18:51 executing program 4: 20:18:51 executing program 1: 20:18:51 executing program 5: 20:18:51 executing program 3: 20:18:51 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) 20:18:51 executing program 0: 20:18:51 executing program 4: 20:18:51 executing program 5: 20:18:51 executing program 1: 20:18:51 executing program 3: 20:18:51 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200080}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x98, r1, 0x820, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6b}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffff8da3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x98}}, 0x40814) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x200000, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000400)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x99, 0x4, 0x8, "413ee9c41874128badbd8ae7c162ab4d", "63feefd954f14eedfd13d75479c17517b2d44b8072c8d5b579ec808520ae36a53cd0fee7506408f00532b8e95c513634a2ae5c9bd20ac0eaf5879de2be8d820d1164daf39583c3168eb91d2b377cdb90df95799a7d8b38059e19f26f24651c756a5388b4850a71f9bb6b039dec032fdbb1d973826c1260198bf7bac7bf2efe8ffbba055e"}, 0x99, 0x1) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000003c0)={0x6, 0x3, 0x2e, 0x8, 0x1, 0x1}) r3 = socket(0x1f, 0x80003, 0x7) sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xa8, r1, 0x410, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x28a}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0xc}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'yam0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0xa8}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r4, 0x80045439, 0x10003) 20:18:52 executing program 4: 20:18:52 executing program 0: 20:18:52 executing program 5: 20:18:52 executing program 1: 20:18:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000fe5fee)='/dev/input/event#\x00', 0x0, 0x0) 20:18:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x5, &(0x7f00000000c0)=0x6, 0x4) 20:18:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8000000003a) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63", 0x4}], 0x1}, 0x0) 20:18:52 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x64}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff40000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000ee000003ed94c700030006000000000002000004000000bb000000000000000003000500000000000200423b000001000012b478407f8604"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000180), 0x400000000000003, 0x0) 20:18:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='veno\x00', 0x5) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0'}, 0xb) 20:18:53 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x80) 20:18:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) 20:18:53 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000005f80)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000a00)=""/242, 0xf2}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0xffffffffffffffff, r0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r1 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) r3 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000480)=ANY=[@ANYRES64=r1], 0x8) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f00000002c0)={'bpq0\x00', 0x3}) mlockall(0x41000002) fcntl$getownex(r4, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x3, 0x0, 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x3) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000010000000000020000000000000000000000000000e000"/72], 0x48) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0x0, 0x0, 0x4003ff) write$cgroup_type(r5, 0x0, 0xff9c) fallocate(r5, 0x0, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) getsockopt$SO_COOKIE(r5, 0x1, 0x39, &(0x7f0000000100), &(0x7f00000000c0)=0xffffffffffffff38) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x200, 0x0) lstat(0x0, &(0x7f0000000240)) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x82) 20:18:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) fcntl$setlease(r0, 0x400, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$setsig(r1, 0xa, 0x3c) fcntl$setown(r1, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='/dev/loop#\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='\x00'], &(0x7f0000000380)=[&(0x7f0000000340)='\x00']) r3 = fcntl$getown(r2, 0x9) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={[], 0x100000000, 0x401, 0xfffffffffffffffc, 0x8, 0x0, r3}) fsetxattr(r2, &(0x7f00000003c0)=@random={'os2.', '\x00'}, &(0x7f0000000580)='bdev\x00', 0x5, 0x1) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1f, 0x80000) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r5, 0x40046205, 0x0) ioctl$BLKIOOPT(r4, 0x1279, &(0x7f00000004c0)) pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000440)=0x14) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000480)={r7, @remote, @local}, 0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000005c0)={@local, 0x3c, r7}) 20:18:53 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x4, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) prctl$PR_GET_NO_NEW_PRIVS(0x27) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r2 = getpgid(0x0) ioprio_get$pid(0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000003c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) prctl$PR_SET_PTRACER(0x59616d61, r2) signalfd4(0xffffffffffffffff, &(0x7f0000000240)={0x4}, 0x6, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x5, 0x1, 0x0, 0x8, 0x3, 0x8}) sendto$packet(r1, &(0x7f0000000340), 0xffffff55, 0x57, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:18:53 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x8000, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) 20:18:53 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="0207000010000000000000060000000008001200000001000000000000000000060000000000000000000000000002b041da7fe0ff00000000000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b820e900000000c7"], 0x80}}, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:18:53 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000001c0)={@mcast1, 0xe, r2}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001580)='cgroup2\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00') setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000180)=0x20, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3a) fstat(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x3, &(0x7f0000001340)=[{&(0x7f0000000280)="97ec90d7b480c87aba1de893c7059c9ca0d55aada06ac4bdb76901b915dd33472ff4eace9f03c0bcbae112399c2bbd83e806f0212776fb2de28089248a6b107803765fc01d8e09170153ffcd96f704fd4ea5e972e6c975", 0x57, 0x101}, {&(0x7f0000000300)="548ac49042c564e0b6c3076619e79e25cc70a45df5b53716ce29f355922f8a63d40a9298eccdfc463e", 0x29, 0x6}, {&(0x7f0000000340)="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", 0x1000, 0x3000000000000000}], 0xac68ff028727d0ea, &(0x7f0000001440)={[{@numtail='nonumtail=0'}, {@uni_xlateno='uni_xlate=0'}, {@nonumtail='nnonumtail=1'}, {@shortname_lower='shortname=lower'}, {@fat=@check_relaxed='check=relaxed'}, {@uni_xlateno='uni_xlate=0'}, {@uni_xlateno='uni_xlate=0'}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup2\x00'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role'}}, {@uid_lt={'uid<', r3}}, {@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) wait4(0x0, 0x0, 0x0, 0x0) 20:18:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=@bridge_delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0xa}, [@NDA_DST_MAC={0xc, 0x1, @remote}]}, 0x28}}, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x10}, {r0, 0x2}, {r0, 0x242}, {r0, 0x1418}], 0x4, &(0x7f0000000040), &(0x7f0000000080)={0x100000000}, 0x8) 20:18:54 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="409000c408810fff0100"/24], &(0x7f0000000000)='GPL\x00', 0x1, 0xfb, &(0x7f0000000140)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$sock_void(r0, 0x1, 0x1d, 0x0, 0x0) [ 1208.252753] cgroup: cgroup2: unknown option "¨6Š›ø]cše!­?šôeéòcÎZ%š" 20:18:54 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) write$P9_RATTACH(r0, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x44}}, 0x14) chown(0x0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000580)={'#! ', './file0', [{0x20, '\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00'}, {0x20, '\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00'}, {0x20, '/dev/loop#\x00'}, {}, {0x20, 'bdev&wlan1'}], 0xa, "9be207bf65b59dc5ae15a434d7a34bf656fc2a116a7c4e8ffad22d80306369a50c5ce11454c486a8bf16e154ddc25cbee19135ea7c9760a0f45e2e3018dec92c6ddcb05c3d5aab"}, 0x288) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000000)=0xdb) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) socket$inet(0x2, 0x5, 0x8) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x3f}, 0x28, 0x3) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x20000102000004) fstatfs(r1, &(0x7f0000000840)=""/158) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000009c0)=""/4096) ioctl$LOOP_CLR_FD(r2, 0x4c01) accept$inet(r2, &(0x7f00000004c0)={0x2, 0x0, @multicast1}, &(0x7f0000000500)=0x10) chroot(0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0xfffffffffffffffc, 0x9, 0x40, 0x7}]}, 0x10) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000300)={0x1, &(0x7f0000000180)=[{0x7, 0x20, 0x2}]}) 20:18:54 executing program 2: r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0x17, r0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r1, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000200)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000280)="2f264628156f93ecc0daffacf95454d5e14e132d9ee7f33fa93e417c39d446880b95dc70f20153ec774937b6da906f07304c81779797c509d74c281f35d8f79cc05f5a83f86d556de885422310ab0019b9d4692a18e004dc33a59be982deba10613e108c318fa9ff51", 0x69}, {&(0x7f0000000300)="f74f99b9f505c3d2aae95b5bef73b9fa3e80b17fdaf0e1bc48bd481115c7d5d1ad38f078f361b9760a27aa6229b83ff3b45801ff240da7ffc59f091b80f4f3cae006ce63ed81efc2f00d1bfbbb09772529ad626a123d697765", 0x59, 0x2}, {&(0x7f0000000380)='59', 0x2, 0x80}], 0x4004, &(0x7f0000000440)={[{@background_gc_on='background_gc=on'}, {@noinline_data='noinline_data'}, {@norecovery='norecovery'}, {@disable_roll_forward='disable_roll_forward'}, {@quota='quota'}, {@prjquota={'prjquota'}}, {@background_gc_on='background_gc=on'}, {@discard='discard'}, {@nolazytime='nolazytime'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'eth1-\xe3'}}, {@uid_eq={'uid', 0x3d, r1}}, {@dont_measure='dont_measure'}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x65, 0x32, 0x77, 0x74, 0x77, 0x37, 0x36], 0x2d, [0x30, 0x39, 0x7f, 0x32], 0x2d, [0x39, 0x30, 0x73, 0x33], 0x2d, [0x63, 0x79, 0x63, 0x66], 0x2d, [0x39, 0x76, 0x66, 0x0, 0x7f, 0x37, 0x38, 0x34]}}}, {@obj_type={'obj_type', 0x3d, 'cgroup.type\x00'}}, {@measure='measure'}]}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000140)={0xfffffffffffffffa, 0x9, 0x10001}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f00000000c0)=0x7fff) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$TCXONC(r2, 0x80045439, 0x8000) 20:18:54 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = accept$unix(0xffffffffffffff9c, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) fdatasync(r0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0xc000, 0x0) exit(0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000440)) lsetxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x31c, 0x0) symlink(0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) rmdir(0x0) setpriority(0x0, 0x0, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="044e9afd48fc0640e9ac8565f692acf981f00f6b85ab389ecafb43be02177aaa6330486f94e5fb7c5c1ba19743510a7b17e034d56b1835c164f4d667146ab8667ae36e1ef1f1cd6c34877823b7debb5ca68dea76e38b779d5793bde1dc9a4442d01e57ace2b514973b3d4ac6203f1ebd39ce67df5db4bd28204f481a6eb1c38a6e72ab7a6282c885"], 0x16, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000380)) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00') 20:18:54 executing program 4: r0 = socket$inet(0x10, 0x800, 0x3) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a800900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="24000000020307031dfffd946ff20c0020200a8009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000001c0)={r1, 0xffff, 0x5}, &(0x7f0000000200)={'enc=', 'pkcs1', ' hash=', {'sha1_mb\x00'}}, &(0x7f0000000280)="67ad544fdc70948fddc958361f142c9ecfd8c871b2c3d178f0856772d9432008c99a52b91e77e92fbc708acf43cb49ddfbfeead4612781b62a236965d2cf6f30d3611140cbf33db361b7d0be6dc9e8fd86739372347ea298e94aeb01648afe7c332be266f1be03dc0e3f540fd143b039dc5870534554e3e29562e517be5beeb3f4b55500b53bdfd008fd52da8275930dca6833b9a6b0c0e605236c53b50d3782c4c29ba54e1e740334eff90505a6aa69a17018b95872ce1c05dd", &(0x7f0000000340)="dd2788956bf96c3efbc3a3d82dab7a6ad050cd44b756e20759e9bba31b5e568f7d4b2f942a3d41798d049c5084a926b7f1d1e353248b91a9ed4e97760ad704b1de2d624202ad5b85ec48a2321732f462229289c50b3368fd00c3ed63b19dcbd273f78ac8fb267588d53eebe2779aa84e6725814a018c55df25533a5f") setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)={'security\x00', 0x3, [{}, {}, {}]}, 0x58) [ 1208.803741] kauditd_printk_skb: 182 callbacks suppressed [ 1208.803751] audit: type=1400 audit(1554668335.005:49009): avc: denied { map } for pid=26625 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.948753] audit: type=1400 audit(1554668335.005:49010): avc: denied { map } for pid=26625 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:18:55 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) socket$inet6(0xa, 0x80000, 0x10001) [ 1209.025798] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1209.065235] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 1209.092711] audit: type=1400 audit(1554668335.005:49011): avc: denied { map } for pid=26625 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1209.123741] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1209.142040] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 1209.272381] audit: type=1400 audit(1554668335.055:49012): avc: denied { map } for pid=26628 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:18:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0x10, 0x3, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mknod$loop(&(0x7f0000000100)='./file0\x00', 0xa, 0xffffffffffffffff) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setresuid(r2, r2, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) [ 1209.713646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1209.721997] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1209.725970] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1209.728880] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1209.737148] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1209.741155] audit: audit_backlog=66 > audit_backlog_limit=64 20:18:57 executing program 0: clock_gettime(0x0, &(0x7f0000003100)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000002f80)=[{{&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/96, 0x60}, {&(0x7f0000000180)=""/229, 0xe5}], 0x2}, 0x80000000}, {{&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000300)=""/174, 0xae}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/170, 0xaa}], 0x3, &(0x7f00000014c0)=""/232, 0xe8}, 0x3}, {{&(0x7f00000015c0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001640)=""/85, 0x55}, {&(0x7f00000016c0)=""/203, 0xcb}], 0x2, &(0x7f0000001800)=""/63, 0x3f}, 0xe42}, {{&(0x7f0000001840)=@generic, 0x80, &(0x7f0000001c00)=[{&(0x7f00000018c0)=""/35, 0x23}, {&(0x7f0000001900)=""/37, 0x25}, {&(0x7f0000001940)=""/182, 0xb6}, {&(0x7f0000001a00)=""/215, 0xd7}, {&(0x7f0000001b00)=""/204, 0xcc}], 0x5}, 0x56}, {{&(0x7f0000001c80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000001d00)=""/175, 0xaf}, {&(0x7f0000001dc0)=""/4096, 0x1000}, {&(0x7f0000002dc0)=""/119, 0x77}, {&(0x7f0000002e40)=""/5, 0x5}, {&(0x7f0000002e80)=""/48, 0x30}], 0x5}, 0x6}, {{0x0, 0x0, &(0x7f0000002f40)}, 0x2}], 0x6, 0x40, &(0x7f0000003140)={r0, r1+30000000}) setsockopt$packet_buf(r2, 0x107, 0xd, &(0x7f0000003180)="455052f5b5532a2ea43947effe0d6b6b14071d8f8fbeada9e9ac7fa4beec824a206b00828bdf67f67ec355b8d60cccf96392311ac9bae59fcc0effde995d1d17b6659bc58535c018752b68eb6cc8389e6fbc18d69f036f19ec35adad84a41e3c43b2ba4d50001c8e8649ad727132f43b2db21a94a26131d559511479a5ba4e05218d89a5b7323221b94bc923bd103b508bc8d37266ead91868f304fedf2f3e25b094addfca4217b832035ef347015548e289cc369a2a028f6e839772c709381eb6cf9e80e1f9c4dfc114b4f526d0243075c6de9f4a302b75f6894d49", 0xdc) r3 = socket$inet6(0xa, 0x3, 0x4) socket$inet6(0xa, 0x80e, 0xd2d) setsockopt$inet6_int(r3, 0x29, 0x19, &(0x7f0000000140), 0x19c3e9d177914dfa) 20:18:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) madvise(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xe) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x1, 0x70, 0x4, 0x400, 0x3, 0xe77, 0x0, 0x96, 0x59042, 0x5, 0x3, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r6, r1, 0x0, 0x17, &(0x7f0000000300)='/selinux/validatetrans\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0xfcd6, &(0x7f00000002c0)='\x00', r7}, 0x30) r10 = getpgrp(r8) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) fchown(r9, r4, r5) geteuid() openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000200)=r10) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:18:57 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = dup2(r1, r1) write$tun(r2, &(0x7f0000000040)={@void, @val, @ipx={0xffff, 0x1e, 0x0, 0x0, {@random, @broadcast}, {@random, @random="d7b52e2ab5df"}}}, 0x10012) 20:18:57 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) [ 1211.350237] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:18:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) gettid() setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000280)={'U-', 0x4}, 0x28, 0x1) timer_create(0x1, &(0x7f0000000100)={0x0, 0xe}, 0x0) timer_delete(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="d4bf8336b2c67dc514f4dfcd1a0ff72a724800000000000000000000000000000000be0081143f5768cbd06a9040916158f97005b23132c83e4831f883e3405c152b34ae65ffd47f2d9b2ab172a5224486e40fd97d272950a4bb1d4082a74f03742353e327b30db853a5b049c2bf386c00000000000000000000000000e500"]) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) inotify_init1(0x0) sync_file_range(r2, 0x6, 0xef, 0x4) ioctl$TIOCGSOFTCAR(r0, 0x5419, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r1, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, 0x0) write$P9_RLOPEN(r0, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000340)={'filter\x00', 0x4}, 0x68) ioprio_set$uid(0x0, r3, 0xffffffff) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000240)) 20:18:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000080)='./file0\x00', 0xffffffffc) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, [], [{0x801}, {0x801, 0x0, 0x0, 0x8}]}) 20:18:59 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_pts(r0, 0x501900) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000040)) ioctl$TCXONC(r1, 0x80045439, 0x0) 20:18:59 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r2 = creat(&(0x7f0000000340)='./file0\x00', 0x1) fcntl$setpipe(r0, 0x407, 0x3) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000480)=@v1={0x1000000, [{0xf6, 0x6}]}, 0xc, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) setreuid(r1, r1) r3 = geteuid() connect$netlink(r2, &(0x7f00000004c0)=@kern={0x10, 0x0, 0x0, 0x8}, 0xc) setreuid(r3, 0xffffffffffffffff) 20:19:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='cgroup\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x0) [ 1213.814472] kauditd_printk_skb: 1220 callbacks suppressed [ 1213.814481] audit: type=1400 audit(1554668340.015:49789): avc: denied { map } for pid=26837 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:00 executing program 5: r0 = epoll_create(0x4) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x803, 0x0) setpriority(0x0, 0x0, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x27, &(0x7f0000000080)={@local, @local}, 0x8) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000100), &(0x7f0000000140)=0x10) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) unshare(0x20600) prctl$PR_GET_TIMERSLACK(0x1e) link(0x0, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x80000, 0x0) ioctl$LOOP_SET_FD(r4, 0x4c00, r2) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) fstat(r0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f00000003c0)={0xb81, {{0xa, 0x4e24, 0x400, @rand_addr="01da7c42553ebd60cbaf1e4d374a5269", 0x6}}, 0x0, 0x9, [{{0xa, 0x4e22, 0xe98, @local}}, {{0xa, 0x4e20, 0xc8, @mcast1}}, {{0xa, 0x4e21, 0x82c, @empty, 0xd200000000000000}}, {{0xa, 0x4e23, 0x3fcb, @remote, 0x8001}}, {{0xa, 0x4e21, 0x9, @rand_addr="f35af715bf59518afbe6db992d5d081d", 0x85e}}, {{0xa, 0x4e21, 0x100, @dev={0xfe, 0x80, [], 0x25}, 0x3}}, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1b}, 0x7}}, {{0xa, 0x4e24, 0xfbe, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x30b3}}, {{0xa, 0x4e21, 0x80000000, @mcast2, 0x8000}}]}, 0x510) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) [ 1214.014745] audit: type=1400 audit(1554668340.045:49790): avc: denied { map } for pid=26837 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:00 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) alarm(0x400) io_setup(0xffffffffffffffff, &(0x7f0000000480)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x4, 0x0) futex(&(0x7f000000cffc)=0x5, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000200), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, 0x0, 0x0) exit(0x10008) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x3fe, 0x0, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x101, 0x4, 0x2, 0x3, 0x5, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x1, 0xda3, 0x80000000, 0x5, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, 0x0, 0x0, r2, 0x9) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x2, 0x0, 0x0, 0x9917, 0xffff}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0x6, 0x0, &(0x7f0000000080)) r5 = creat(&(0x7f0000000380)='./file0\x00', 0x120) write$binfmt_elf64(r4, 0x0, 0x0) fsetxattr$security_ima(r2, &(0x7f00000000c0)='security.ima\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02907a498d28dd000000000000004d84b3244c275fd93dce3048118b99d686f60c6ac24c7b5d0277a786f7187b760d612b8c3d73a697a3e49a1e8dff442e8d1dbc71fbe77a2b12f79128e35bc231b1432638629413558c05795d247e8c648eab3b3f"], 0x1, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x7fff, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f0000000340)={'veth1_to_bond\x00', 0x1218}) getresuid(&(0x7f0000000240), &(0x7f00000004c0)=0x0, &(0x7f0000000540)) keyctl$get_persistent(0x16, r6, 0x0) write$cgroup_type(r0, &(0x7f0000000500)='threaded\x00', 0x9) fallocate(r5, 0x3, 0x5e89, 0xfff9) write$P9_RREADLINK(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x231) unshare(0x40000000) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1214.165180] audit: type=1400 audit(1554668340.085:49791): avc: denied { map } for pid=26837 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:00 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x52cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x100, 0xffffffff00000000, 0x10001, 0x6, 0x14, 0xff, 0x0, 0x7ff, 0x4, 0x0, 0x8, 0x51}) ioctl$TCXONC(r0, 0x80045439, 0x0) [ 1214.304788] audit: type=1400 audit(1554668340.085:49792): avc: denied { map } for pid=26838 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1214.479719] audit: type=1400 audit(1554668340.115:49793): avc: denied { map } for pid=26838 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:00 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x3f, &(0x7f0000000100)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0xffffffff, 0x80000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x10000000}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000180), 0x8) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x0, 0x100000000000000}]) [ 1214.590171] audit: type=1400 audit(1554668340.125:49794): avc: denied { map } for pid=26837 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:00 executing program 0: r0 = dup(0xffffffffffffffff) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f00000005c0)=0xe8) setfsuid(r2) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x40000000000009) timer_create(0x7, &(0x7f0000000440)={0x0, 0x25, 0x6}, &(0x7f0000000480)=0x0) timer_delete(r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r6 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000180)) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000340)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f0000000200)={@loopback, @mcast1, @loopback, 0x1, 0x100000000, 0x2000000, 0x400, 0x7fffffff, 0x180001, r7}) r8 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r4, r8, 0x0, 0x800000000024) syz_genetlink_get_family_id$fou(0x0) [ 1214.683448] audit: type=1400 audit(1554668340.125:49795): avc: denied { map } for pid=26838 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1214.799683] audit: type=1400 audit(1554668340.135:49796): avc: denied { map } for pid=26837 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:01 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x300) [ 1214.914042] audit: type=1400 audit(1554668340.155:49797): avc: denied { map } for pid=26838 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1215.038238] audit: type=1400 audit(1554668340.165:49798): avc: denied { map } for pid=26838 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:01 executing program 5: r0 = epoll_create1(0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000000c0)={{0x0, 0x1}}) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x1a0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) mlockall(0x41000002) fcntl$getownex(r3, 0x10, &(0x7f0000000200)={0x0, 0x0}) prlimit64(r4, 0x3, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000000f3ffffff00"/72], 0x1) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0x0, 0x0, 0x4003ff) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0x203) syz_open_dev$binder(0x0, 0x0, 0x802) fallocate(r5, 0x3, 0x8000, 0x8001) fallocate(r5, 0x3, 0x5e89, 0xfff9) sendfile(r3, 0xffffffffffffffff, 0x0, 0x3) splice(r1, &(0x7f0000000100), r1, &(0x7f0000000280), 0x8000, 0x3) unshare(0x40000000) ioctl$void(r3, 0xc0045c79) perf_event_open(&(0x7f0000000040)={0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r6 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f00000001c0)={0x22, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00c@@\x00'/34], 0x0, 0x0, 0x0}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x0, 0x0, 0x8000000000000, 0x4}) [ 1215.523322] device Y­4`Ò˜ left promiscuous mode [ 1215.546932] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1215.559995] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1215.570224] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1215.650182] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1215.710209] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:19:02 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='attr/keycreate\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='illinois\x00', 0x9) r1 = socket$inet(0x2, 0x2, 0x1d) ioctl(r1, 0x400, &(0x7f0000000140)="31e1d34a5c7a53545b1e2cdbba03cfb45b34f91134ef9b71d88405e896c31320a1ddfa05df40c72d477cdaa86b290a2b5ffca62df3d1399eae6e96781572d5a7e963fa5084702bc9dd1036837d45c20fca2e737c1a2f4eb1dca32d") connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c20000007d73cf61100f4c004500001c00000000ffff12009078e000000200"/42], 0x0) 20:19:02 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000040)=0x2) ioctl$TCXONC(r0, 0x80045439, 0x0) 20:19:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x8000000009, 0x0, &(0x7f0000000040)) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000200)=""/149, &(0x7f00000002c0)=0x95) write$P9_RSYMLINK(r1, &(0x7f00000001c0)={0x14, 0x11, 0x2, {0x1, 0x3, 0x4}}, 0x14) syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00') r2 = getpgid(0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) setpriority(0x0, r2, 0x9) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x8a, 0x4, 0x1, "85b3e37d55fc1e417e7cff869e93caf8", "845273c1a408a76a48af6a8cbe606d1d04337253fac7f1ddc6e41664b72fde9af4865b1a8171ea72ab58c99051d950b7e8382e6957d87442d5bc2d9b5080c05179491cce52ad724993dae5e6168a5a3e46b7674ca459dae5cc830fee7cbb4bcd9436b2a8df98fb0ebcbbed2f9376749f8182e32cf5"}, 0x8a, 0x2) 20:19:02 executing program 1: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000001540)=""/4096, 0xffffffffffffffcf}], 0x1) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000080)={{r1, r2+30000000}, {0x0, 0x1c9c380}}, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='\x00', 0x282000, 0x10) fchmodat(r3, &(0x7f00000000c0)='./file0\x00', 0x80) ioctl$PPPIOCSMRRU(r3, 0x4004743b, &(0x7f0000000100)=0x7) 20:19:02 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000200)={0x3ff, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}}, {{0x2, 0x4e24, @empty}}}, 0x108) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00') rmdir(&(0x7f0000000100)='./file1\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x2404c801}, 0x0) 20:19:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x21fffc, 0x0) r2 = socket$inet6(0xa, 0x400000000005, 0x20) dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @rand_addr, 0x8000000000000000}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) fcntl$getown(r3, 0x9) r4 = gettid() fcntl$getown(r3, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x101200, 0x0) setsockopt$inet6_int(r2, 0x29, 0xa, &(0x7f0000000400)=0x8b, 0x4) r6 = syz_open_procfs(r4, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) ftruncate(r5, 0x5) sendfile(r1, r6, 0x0, 0xc949) 20:19:02 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) 20:19:03 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x1000020000000000) bind(r0, &(0x7f00000008c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80) 20:19:03 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000000140)=""/203, 0xcb, 0x120, &(0x7f0000000040)={0xa, 0x4e24, 0x1f, @rand_addr="bbbeb27ada8aeacc8faf71fda2906243", 0xd7}, 0x1c) ioctl$TCXONC(r0, 0x80045439, 0x0) 20:19:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000200)={0x1114, 0x15, 0x7, 0x0, 0x400000, {0x2}, [@nested={0x1100, 0x5e, [@typed={0x14, 0x8c, @ipv6=@local}, @typed={0x8, 0x48, @uid=r1}, @typed={0x8, 0x63, @u32=0xfff}, @generic="b027ecadda4a2aeed069bad1cfdc197d0dde381979aef199c72adda26f3f68f2c212e50cebe0ff96449e32a5b7", @generic="52ec7136ec59ce37da2b2796648979", @generic="bd7ae9ac4b47f1ae27fa82d86ff475e2edcce901731f00dbf0c6b07d77e161bea0f12a929312e74f6017f4b4b3963159cad8922c5184e6584d75922906600ad994fed734a48712e9db3500c72db91a64622315c371a78a354ec4c1aa56ccedcdc5c3765ea0892b489a6dfe54df459264d0ecfca9699ebfbbffa78572f573a53c9adb3866905be9890f6fafe8dd409715eed20a3a5406f12fc914f22686c0ce34633f280ef3cc160fe135808d98ef0992f4ef4a13d5860a9c940709cc7b4e54fad1f56e4e1a4b151c6a2f8fb276991e8eeed0c43f015acd6a5e402dea5d8a687f8990e30a00cae97f1316d0d896406605e8a13a8630805795187cc2863afa829b804b1cd37058921972defeb12dd3daba8c408ad7290793bf435dac2ab808ef839fa9ba1994e9949f5d73aadc7227a58ec1cf3a4ae841fc1162924dc927fc536c3759175c84aae952b488cf26df43670f59dba5fb9979a1b3a0491d206f775d424fd20493b281cadc53e72e892e43392e922b26c8372ae179eadc754729d770a6c87ffcdcd541d9ecc2bab9cdce2efb9e99a41ba96ae4d6b12fc7ab9d57e45002696343f9bd4e31d3f4132808044997a5662057504e2c6f7d93119b561fc4cb59628acadd7c3bce4940a2577ffc4752a548c9e376bbdcac79b0474b178203c902ece53814c3ac595d19acae09a965eece5c5c0ccb9a5cc8a1aaa4907e63ac35d0b168acc8a957910c2c23520834cb83c79f43a7077b6ebf8e36d05ad0dedefac668678bb4c5f9704d901239c5a8c5e6289d1858abb25c137142ccb212ce343a8a9aadaf3ae02de02eb61a7a9ad97ae9c4a324b2e5935ed610e918114826b50425894388f0428a27c9ad23218d14e55a4b0f39d377b3b35dbba20464a56b9002da20bcbdb9db1f794291de9128dd5b313a7e5bac4d61bb99276154e3bf2ed807909d71d8bf307ccdb1e62f8ed8567148b3267e26b4a147838097b6be7ed4f2175d68dc7ef8d97a7409ea91657a9cb1299c455f33347c3cf7cdf0c6144cf2a283ec80803073d2a466bbe8603029581919b8d5f6208c1bb5dc22720cd235ca789a510e846a0098b06ba9d72a31296e6d3e29c0fb7b814eb3f3261336f0cd5788c655bd0d91c153918a29bec683d169fd6ce9972ca78c0e9263ce8ebdfc9750104570b8802358769cdc278812a44952353a232cd534e0bb38c3f8aa78a1b4945b16690fbff8233e267848eee7ca3f1b01709065141ab1f7d64a6a27594eda950369f9f5c95368614853ba2e4de1d7cd111ec3a95b06a6fbd730dbd5dea7b92430c8699396b730f84a0e4daf317bc30396e8606c426d7239d22f6efb044ffe50b3b498852b11d9366b24d768c640ecc20e20a9888ea5b622bbf35fe65fd88f520c58f21b413b08755529b988a993e37aed411d919c2a9a57a856958294fd870da81c821b18efdddb4c88d1359a14d77f611d007266d4b92c082efeba728151ed3ac7a1b38ad9f8bd1cfc34c86ab5ed15aa2d0e1ea0834c9eff0b3b7109de05d5330059cecf416a3968f07d7a3dc7a6fd3edfa1cdc54cbeb43e3e86cb189108f68705ec8bd89ddd374c44f01cfd81d5801822b5acb7c67391fdb5ae1949b7a81d16c8d8f8f1c8e0ab6824da7d611ff69f7c2c07124d7506c475ba9586e15faf0b089bb9705996e7d4db05e6f64f7980330df56b8e467b4b8fce5af766c17aa27807bb72a4f432affd619cdc911c9164e4abffc3d258a3c58c9327c6dbcd6cab7dc4e84166464880d59bfe843d7788b6ea8447d74dc88e9cc30e7c8b0e6b68c1bc817ede8e6a5b5a17255a3cc4116c53f8565c420042cd90255fcd1f87f419e8c997bf85ddf05eae33a111189020ed1d0317d60c01e6be5634b4eaedfaddb6a78f9896ae8e4f1456f104baf49ba132361eeeecd54fef5c5c20158b62894d72911e9790ee2537c5e56f1fe815b1fd41ff7635b0c5e7065aeb912b7357260ccad85d466de0c23e7819051c2773759c1b21a68a005f05a07dd7730e37b2977af86f07e5ede48836a5eba3a09c42a82b2bb2e5462bc88ea43a511f97d4b05e97040ddb4977042a8669ba71071749df300196a3e9972186bea62a8647ccc336dff727684da5f58d26c0040de04d5614bca439bd9b87929c6ded43570577d363e531ade7b2eedb6d04f887e7d25c2bbc892e6b57a4e2ea20fcdc942d46935541140fbd07adefe16e121b03fc493635e6c8e0dbf6ea41471482a780692601f87868af402a5c09f24e3cee33ab5d6e72968dc03095d0b6284ab8e96bff47993d88982940df3a7107ee3fcc37a9a8e7c1fd9d25f2f33c980254f9f0f2ed9d1ea388324f2f393ed6644fc1fe17078e5f3bc1dbf9e0828b558c80468b17191157987d53a1f055a6e3cf2f470bb63f638bb2ef5f21f5aee786baaad5f45a2ae127685a3a34213aea32b6a12b82729e6387f0addf6c8426fefe23bbf1fafbb727b6309397d91eac6bc290124f9f5292aa22492456d697a49455b742022c857ac776d438736cb0425855f8eb3354c11f5deb6d22dc6664badc1e7d21e94f875542cac2ed362ba772131786df53abdaf6c9232572d378f4680670c23a11d7a8962410110252745e9fdf2ba78e5d027c1c68ab3e70001e99c5713356baddd9b24227e87cddff4f7db213ae4592a613009159845e4ef5eb21963c7d7149bbd0f19676c86eb51786ee89b2c275f3b3a82394ffb5aec375505246104ad74a0d1733cbf27b591977838978193ae4db949c7c1bd305f339af8ac0df417c32be8ca32bcccac6150062f0408d3ed6abf270ba637a12f6d9659b39ab57eab01abdfb17139d11bbaefc78b8cacb94dec062340b0018de9a2bccafb87fa8adcbc7308f261260c95cbac41dc5de7c9179ddeee8edcf2616091eff632651f66e21e49d25847459f40d4a0526ea41ad32e048038ba3c18f6c8ca9f3eecccf900a349e45867e3222c28c590469fae0410dfcfde8fb16e588e37a24cea78c31f92771c8147ba15a81943b0e24a1ad064cb34ca05bb364c1849e53a5050c6ba72195fecf416f3b404725afc5725eb2f2cf861deb8465becd3bcdabae3695f37dd8cafad7f89a34114a95f72e1772b67bae4f0399143940c290396411e7daa819592f41859dc5009bc4b4108e8b62ef6afb50496a728ac44cd4b38cc4b22554e37c25402aa5e262a70198b67f0cb5cb73e92d4fffdbbc131fa1fc4d7c8af6583b5620205f07ed4b24117077177e6e9f0e268c7cfb0e3b466675ec7b4c19e51274c5024c23b2e34318b14d7f64583385603c2925c20f1f9723d7e1e4bb2a71ab1140ab569c3afe875be9459c1f41cc0d793a529b46ede4d811dc440cb1b0db009e7497c53e00148090adfeb7b2983a57ce894f205dfb693dc0b76d025eeb8a0568e26a306e8aab3bba034f6141db31b4deba391cdd23ed4a310a6a4a2199eb521bf93f4858fd5c0d54f14bdeae00aaf3935c03718934fb165079f5d3672f350c7bece2a6bd76eeeb82ea79b6421136575b2d0874d42cb0c691f549125f83768486a678c29325437c5bc39c2241dc3813dd963f9b34de4e06f6a7b74779f55c0811843305990df3efdf111c5666f40d7fd1559004fcf4a36a66f81663b1c7092e7f50a2bf3a87b26713313c017bae09269fb29cae3e936c46bd2ba727e50092dedc4bec43e2be27333534938fe134e23b76a51f6cb8d146fe9f3a837169cefa4cb626061accd613f639db39fed0ce76b97c30ee74b327ede4a7a7b71db716be8b4e3cab33bd827fdd96b4c5b70784d5ccb39bc3b334f92d6cca278ff9542fa70044e9efd76263a21f6cf496c44f8b93cc9428f53d3053134196386c6fac558cdbedbbcdcb8604d55598e5b504f809dd3b592e39830171dbaf70213e1ebc4f7cde79f12bd8b54367f10db7a40f85bd3669540cc36446f8e411b7286f4b59d7cfb5eba8901693ce125f508c9ee55eecabd7b66187cd1ad34db58019762e3d409d26d9019615a1c2f53f2e1b09a4ef14b7732acf990d31c54bff3bc6bd00b4a103eda2c5f3c75421f6144856e126339acb06c70a9aeb1f9fd246d432820f1ad88d1e9197c67f74a51d6a1010b19bf0d76e087242a20129081d7a6c25578517b6e0ea7f7f7c1126966b0695f4261b75eb9b1fc777626e43dd1aa3b5789981e17830e60c5ef160ee3380895510c4af3a213d213b978436c4463bb3fbb00047742a8c32412bed343d45d3a4ef94f01e08e7ad5b653ddb2ac7ef42960d05e713ef820e461ec45fa70dacac95b3c08280faed035a99b20d08fca28d99fb7701c6a8700f516294541b61a205380203071e4c04ca6312ee19194a8fe563d9455f061494f926c49907454308bfd0a0facfb83f7497f854e2756b4252888734782d682866993e19a3912c337541a6c2d8e9fedcedb4e183e26027a5a227edbbff9d5b1b8fa2dc8bfb0f34f8128fb157f188e80327575f73229bc274180f846327736362f905ed581501dd88db6f30aba827d33421dc809c1b2dbba593dd28313d1b0b1b08ca786ab3ba452c6a1050d748087bb5c4b4a68c2ccba931343220c3d9812d7e346df34741b1510dd83d748f35aed016eae408632f9fa15c2b2a7a4ba6b1a734c772fb98117198ad47ccd94bd2bcee98c54ec1e1e17793a13b1976bd43b9d7b0a2ee474488896f6c9fc2f98d923c50513c3ca47a58d1856e75e49b716f72b473d9e0b81edfbaa01e1fe57d488f49570ff1d05255fd1c09b71fb82ff2df198c07bc5210e97fba2aaea943953ed987b2265ecfed4add07d8251786f9cf322342d5aca29f8914f8f4f6b70277795ae4fc48c767593d13c92a0746c80fcbcd1fc529a14e31600a383d8469573e9f6dcb63771a6c2fbdf22333a2d4daaaf669a8dc74380e7f4590e282dc9ba8257f12644fa5e60f9182049fd9e4ffb1e4825a57225343e2463d52ab3f4f4e9f423075757104ed3ce036ea43da592a52a99ae6bac687f7d46488e040c638c731bf6f72c12793d0e63a72fa7fb475c8ea8251e4539e67c8ac5a20d24166c721c46f8781f3f3f9edc329dfc9bf4eb6a752bdaa8ddab17bdd6f7dcf688c0fcb4219d330628d7b9b213446f6f90a818f60b6f2822fa239da1e37ee16b5a529b663b56bf0755f13790a17ecc3f788b7cd3c433f0d3f9f302336b032819ff9697b2b5088fcd6507046a00fb58ea32e4283db1adbbdd960f99041ee2cf245590d33c617690a9b865f3ac199a213d5757a8f0cf08cb6ccd5f4c9105886d24f1f56a8e37b9d82e06785c928199261a6b78824038863251c6d80de47c39a8d923998ec73b009d60a435b4aaba25568d9141f575ed20269a4d8d86a0adb95f537c7ccb6c85afe52c2b9efe763777180b59be55a16f063fd8b7ddc305d4950ee2d3fac1f8618c2ca595f08621c6f3887ec7c739af942884908ae712867e10b6a911acc26f31ce1f2595ef09c60e6d2ad6f0ae93bf5bd657ae20ac2420e1ccd576792b8c85c3a01c43f1e3bfe28df18d08e494664cfda72aea94c0fb668525b754c67f4568f36d1d24a90f06c60da2a8a532568de60c7c2f86f8ac34927592d9449434d626958626a07316fea6094432a0e4e102cebf6094823278e1b8dd28322ce002324d3a22f653d7ffc5398fea363da27446e2edd4acfa6223d316cc8a3a65a9aad3f267b02be0918b54746a101ad56bc40deb4837cd7f6d06cfd98dc035fa1169989af9d716f35074ff2d73a9887196a69a091735167fb9e2d27f5e3bd0163387881023b6f7561da23c33fefcb558d0624ab", @generic="1c227cb34c4462ad8a322ccbc13a3b73fdbe79b25f654717f6ae6b74f6799db7c8ad1fe5e770c46eb3ed3542b06db42cd73b0a9d9328488ec8d61b0880b3de8be618dd8604ab8300eb11f41068293f61f3a29d46fd79913124349a1e9ca94de05facfb0ccedcdea9931763f0aaf834f72485ea25e47e6d4f269fcbd2ad185bdb920d410b8e224fabf8cf380473e157e67ea837a1983279957baa85"]}]}, 0x1114}}, 0x4) 20:19:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) fchmod(r0, 0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x0) 20:19:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x14}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000300)=""/195}, 0x48) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) 20:19:04 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x20) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000040)={{0x3, 0x3, 0x0, 0x0, 0x200}, 0xcd, 0x17}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x80045439, 0x0) 20:19:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) pipe2(&(0x7f0000000000), 0x80000) flock(r1, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000001c0)=""/4096, 0x1000) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f00000000c0), 0x4) 20:19:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000180)='blacklist\x00', 0x0, &(0x7f0000000200)='\x00', 0xfffffffffffffffc) clock_gettime(0x0, 0x0) futex(0x0, 0x4, 0x2, &(0x7f0000000140), 0x0, 0x1) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x9, &(0x7f00000006c0)=""/126, &(0x7f0000000740)=0x7e) r1 = socket(0x11, 0x3, 0x81) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) accept(r1, 0x0, 0x0) clock_gettime(0x0, 0x0) futex(0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0), 0x0) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'veth1_to_bridge\x00', r2}) prctl$PR_GET_FPEXC(0xb, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x24, 0x0, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000640)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x5}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="40030000", @ANYRES16=r4, @ANYBLOB="000325bd7000fcdbdf250200000008000100", @ANYRES32=r2, @ANYBLOB="a00202003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000100010040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000014000400070005e0ffffff7f03000002a70100007c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000004c00040006008040008000000100040400080000010080070600000005000900050000005a03850201000000010c0009000001000200090800000000ffff004a0000000000080403020000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r2, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000600000038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040006000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="7c00020040000100240001006c625f706472745f737461747300000000000000000000000000000000000900080003000b3f0000001b58ab9bf8e8f738000600", @ANYRES32=r3, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000008000300030000000800040001000000"], 0x340}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 20:19:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x9, 0x20, 0x6d, 0xfff, 0x8000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x20) r2 = dup2(r0, r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) sched_getattr(0x0, &(0x7f0000000200), 0x30, 0x0) 20:19:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/policy\x00', 0x0, 0x0) write$nbd(r1, &(0x7f00000004c0)={0x67446698, 0x1, 0x4, 0x2, 0x3, "df529294d8fd6a267be9fedbd474b61dee0a1548d961d36386600d3ef011636ebd24b4d951ad2f8bf0a84a845498c5f7e537c491f15a2107d48eb230764c5945ded9f887fa2a028f0f8f1475e7e0027ea6550fcbe1e4cceb8f946d8808ae1ad93b9b4de06d339080d3184525f2ad451da3f5e3d96bb3e42417e509eaff3a3642b38e7adec38bb5be8df1ef577d"}, 0x9d) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, r2, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="61ebbb4279127edf98e64c8a6fdb87cb"}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="15752e155975c311619553ac227c7da1"}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="443fa044699f7ac1057eb3ff49cbbf66"}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x80) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000180)=0x5, 0x4) poll(&(0x7f0000000100)=[{r0, 0x8341}], 0xb8, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="84030000", @ANYRES16=r4, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x40}, 0x4000) 20:19:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0xffffff7ffffffffe) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr="e54abf4a71642f7af1ce197dd9af46b7", 0x0, 0x0, 0x3, 0x3}, 0x20) close(r0) 20:19:04 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) r1 = gettid() ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000000)=r1) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) [ 1218.825038] kauditd_printk_skb: 250 callbacks suppressed [ 1218.825047] audit: type=1400 audit(1554668345.025:50049): avc: denied { map } for pid=26967 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.962558] audit: type=1400 audit(1554668345.035:50050): avc: denied { map } for pid=26967 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1219.072495] audit: type=1400 audit(1554668345.035:50051): avc: denied { map } for pid=26967 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:05 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_robust_list(&(0x7f0000000580), 0xfffffffffffffedf) read(r0, &(0x7f0000000200)=""/217, 0xd9) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) close(r1) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20004400}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="150d030000c10000000000000000b3d582e8997e45e2ab1136211a4c02cf256bf6c925879b8c422c012fe3a3d5efec7df8a047d3c720fcd8abf635eb894ff4f6643fe85a9b6068537796532a31aca31ab28a74edf349787c3f6626dcc53d14b3cd912332c4ab4a624ebf6b1c2ba86943df4c85a0bacbff64b6f601cd726d1b7e5ae9eaf6eec7e0779019c5342973ecf84472f75e0c1db20db362490bcb4fd192eb30b9e3f9e55942"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) r3 = socket$netlink(0x10, 0x3, 0xa) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000380)) getpgrp(0xffffffffffffffff) sendmsg$nl_generic(r3, &(0x7f0000000400)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x100) ftruncate(r4, 0x200004) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendfile(r1, r4, 0x0, 0x8000fffffffe) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000140)=0x3) 20:19:05 executing program 3: unshare(0x28020000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x2, 0x6d, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0xffc, 0x300) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000100)) r2 = dup2(r0, r1) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000140)={{0x2, 0x4e21, @multicast1}, {0x306, @remote}, 0x0, {0x2, 0x4e21, @remote}, 'bond0\x00'}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) [ 1219.184332] audit: type=1400 audit(1554668345.055:50052): avc: denied { map } for pid=26967 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:05 executing program 1: pipe2(0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000100)={0x1ff, 0x8, 0x0, 0x59, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x0, 0x300, 0x6}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000000)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x2) ftruncate(r1, 0x400000000040001) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000000002) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) creat(0x0, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000280)=0x5) fcntl$addseals(r4, 0x409, 0x8) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) dup2(r4, r3) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="ffffffffffff000000000000080600010800e40400010000000000000000e8b7aa0274e1000193e3ce93d3a1ac141400"], 0x0) [ 1219.353101] audit: type=1400 audit(1554668345.075:50054): avc: denied { create } for pid=26969 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:19:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @initdev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) clock_settime(0x4, &(0x7f0000000040)={0x0, 0x989680}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000a40)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a80)={0x0, @loopback, @broadcast}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={r1, @multicast1, @multicast2}, 0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000c340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000007080)=""/4096, 0x1000}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 1219.563578] audit: type=1400 audit(1554668345.075:50053): avc: denied { syslog } for pid=26966 comm="syz-executor.0" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 20:19:05 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) alarm(0xbc7d) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x7, 0x0, 0x8000}, 0x4) 20:19:05 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a5f747566000a66bc353ce65af81f90af78a4dc4d7fc4bda3596031b78ae1ac179c823bdf5a130a7116e27de7ddcff641b3a05c70d6604d77c6d0ab02ca0a70a2af58eedc07776b07bdf6f807e9739ac5c6e01b601fbd25f21b4090dd0e843d279d0b6106eed6d95909fdac7475508f4ded1b196e59286cd86b936b6547c3e678395332a5d5f5371418cd235582"], 0x9b) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) r1 = dup(r0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000100)={'ip6gre0\x00', @remote}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) r2 = getpid() getpgrp(r2) [ 1219.678526] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1219.679858] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1219.694980] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1219.715309] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1219.990226] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:19:06 executing program 3: r0 = creat(&(0x7f0000000000)='\x00', 0x80) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000040)={0x2, 0x7fff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x2f, &(0x7f0000000140)=""/159, &(0x7f0000000080)=0x9f) getsockopt$inet_tcp_buf(r1, 0x6, 0x5, 0x0, &(0x7f00000000c0)) 20:19:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000100)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x2, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x800) setsockopt$inet6_int(r1, 0x29, 0x4b, &(0x7f0000000180), 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x0, "7eba3452e5f93f8d5d666782d0bd1969e3c75f454d538a0c113d0999b70757651dccff5cd3cae922d742687f9d7ce73b1bc3604fcb24a9768449b02764316e645ce646481100c35f4da4e83d4e08e566"}, 0xd8) 20:19:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) 20:19:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000001c0)) prctl$PR_GET_NO_NEW_PRIVS(0x27) syncfs(r0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) read(r0, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 20:19:07 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x3f, &(0x7f0000000100)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0xffffffff, 0x80000000}) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x16) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x7000)=nil, &(0x7f00000001c0)="cbf2111d6c3689dc92b7d0e68235be612ae0890c6da11d1475bd09c0abd5de9b4967fe6a4ae70cbadf90826d5950d200c56f02a549dbb3ace22154d591afb248a283640762b08195e8d46bb86f35b29d142ca0287b307d8b2f408b4cc9fa0faad53cfdeb3bcdc5c03662e7e3f5a36b2a3307da382d76e9fddba7ae55e6cc2c86ac78aacb86a5e0bca2c774109a730dc78ae1b8d037fc23861a27156c4a", 0x9d, r2}, 0x68) io_setup(0x6, &(0x7f0000000340)) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000300)) uname(&(0x7f0000000040)=""/88) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x10050400) 20:19:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x15) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000000)) 20:19:07 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000240)=0xc) perf_event_open(0x0, r1, 0x5, r0, 0x3) r2 = socket$packet(0x11, 0x400000000a, 0x300) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000080)={@multicast1}, &(0x7f00000000c0)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) write$binfmt_misc(r4, &(0x7f0000000040)=ANY=[@ANYRES64], 0xffffff7c) r6 = socket$inet(0x2, 0x3, 0x7f) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x161) flistxattr(r7, &(0x7f0000000440)=""/192, 0xc0) fsync(r4) connect$inet(r5, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, 0x0) sendmsg(r2, &(0x7f0000002cc0)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x0, 0x2}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000300)="9466c1257e795d2b9b6a53a6", 0xc}, {&(0x7f0000000380)="d7584b5be01e2a0d15162ff863562b15782359fe3cbb0ab9f9f7dd62233697747c3e43466942a6248a121c51944dd4761d394f29d517ab2fa1ac1b4924ab3812fdd28713e53d29010ff93c31485d1625ab230afdf3400b8e0a50af4baf8b74acef2ccfdb9a47ec1e3923fb5adc8131e602ae79", 0x73}, {&(0x7f0000000500)="d377bb3a4a76cebdf59f598365a27bdd7b637f33408beba2f7a4bf7f2f495e57b2fab8559922708e7a7cdc28664b575d74d47051648236e2def7cc0c50df7ea6cf001c44f6219c3661ae572b7807ec1b20e50639a9683e23265606f988473545bf4b693cb2bbdf212b3059720a364925e38ffd6f087fa21b001aaf7da8f3cf8d14cff5151a0f11fbefd851e93aa1e60075c433fe54c5065398264942591ba77d392f92937b3cabcd9826adfb874a9375deb9c6c76193f72393d1a9cf0a968e002bb32deef364365673729eb5a5baf5b9199bab0899b6503664c90b73ef6914c9445f60faad3acdecead8a1862734622127d78775dddab1d1de5734d2013e", 0xfe}, {&(0x7f0000000400)}, {&(0x7f0000000600)="a8b4c874124cc866b1c9ed97b90ab483df6e51758517c6537e70b900b23eac0d5afc058f095311eeaf661df3cf6c3e72d254eea0d3187ec1ba4f02015fe9b6aec072682957ff1dcda5d4f580904299ba59c09a1167d604bb63", 0x59}, {&(0x7f0000000680)="7223621c930f7b8c259d9a62bc53d8e150b3e53063c82a8f5e373cc1a36d1db8761da4c3a8590d483913dff97cb971cd326b7b63c02197dad83e0cc14768016a9a7aaa3d3c13340345a4eb087c93c12585f9ebfbcddb4b5888", 0x59}, {&(0x7f0000000700)='l]', 0x2}, {&(0x7f0000000740)="00beab1cbe604f513d5b1f202dc91c5e077e3b66580667ba7f070476cb386f164437165b3f0e45aa3c2256cecf883fd75a7690f21191f80262fbfb8564f06dda21cf64d8001149465b9577186b8167e9f90fa9aa3c029cea2f85178f86e198c75bb6d0cd0319898883ea4e6764aee201c238e83fa2591bb4b5761ceca2a62882dabceebe82e0634dc2444e9c5496ee20990db1089cf49a105aae973ac1d3c9f84c7ce330277d90b0c1596a5ede3b0bbdf257a3a77fb27331e41dcaab1aaa8bdb08097f52d356a40c3a5fa20cfaca92", 0xcf}, {&(0x7f0000000840)}, {&(0x7f0000000880)="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", 0x1000}], 0xa, &(0x7f0000001940)=[{0x1010, 0x11e, 0x8001, "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"}, {0xe8, 0x19f, 0x3, "ad05e6d66514184b192a211427dbfbf63027824ceaf7d7fa671a7868e04222c351ea24f20156207ee8524949d090078feec3a9b4349efd2df32078e04f7ec3a1a5034230b2209c50bb1a7ace0f3ddca045ebc4ebaf687e777b826338adef8d1ca949322d1f64a0ffa91ac13f22d91f9b5f855381946bb083f4974682978a358b6e1d75295777abe0f5891740470eefa84b4875ddbaa39a82033467d413f575aefa5e6269bf8e4899bdbec19d16bd207d6283d1bb33005be1042798cfbc1e1c61f10af97039f226e43c02cbeb7c85dc420e56d896874c6e"}, {0xc8, 0x0, 0x1, "f407b82ca7d486efacc78b3b34c8bda28ad14bfd9eb05212458f87d5d1400712c83f4e71519f5e5d615594279caf1adab4a890ef547840c8628908b044b186ac1d23bd3d4534dd704dbe9e98af427436c524b12c3b5f9faf0ab0f9a8138ed6cf1d14a5f40eb0bb80a595e674a8bb7cf7740a7d10dff82aaee841f30083338070f4d097926ce9dff18307969a820fa64668c42acc4412e328f6fa1a2713d2e230f09649e08648aed479bba0be7afa65e1b59a7a1ecbd4c7"}, {0xc8, 0x107, 0xe54, "ced3753a4c10085b9e4b1a62d5e61d348d575f7453bb7118ed1798039b9b7346334afb17b53ee8191a35618ab6e2b927f6b4e4e302873cbf3917c6eac854528da62e8fd1310d02b2dbacb092c29d8ca7163f10fbc91b8e3cea730e70e5018721563a76cb2cd562d37068805f4682ddaee9fa0636717190dea6e8ec7064d1b04179b7042804e9629981061b8e92eb7711546e66c7b6757faf1bb2855535ff3f8be0332ce51c369a9058128935562f2bba665609c3fc"}, {0xf0, 0xff, 0x9, "e324f84343d909561bdb7f29b197771d828a44e3460cfc7076dca5d2f7318db62b236490cc7a3f43eab71a61d1f39a4b7d7e8376a2f5f29cf03c3e9b0be4f7ca2d3e6725839c819f41425227da04934a653751edb6cf7340088ed8370b1f194a54f2f85e1d6e7db03bc637336220eef5db9ffa7f0c4d846bb1a56aecf8d457e37f6e60c5d98b9f7d0648076f3611ca304749c911d56675d7c5d0215f8d2000f567a488aab888dd2b52a7948cd368d34255569558cf546e31908e85e251517c4de7dc21eb72743c7b5b2cc42f7fbba947c8c525a65746b5834932f2d2839aa4a3"}], 0x1378}, 0x80) splice(r3, 0x0, r6, 0x0, 0x110005, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000400)={0x4, 0x796, 0x1ff}, 0xc) ioctl$PPPIOCSMRU1(r4, 0x40047452, &(0x7f0000000000)=0x2) 20:19:07 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) [ 1221.749214] EXT4-fs warning (device sda1): ext4_resize_begin:45: There are errors in the filesystem, so online resizing is not allowed 20:19:08 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fsetxattr(r0, &(0x7f00000001c0)=@known='user.syz\x00', 0x0, 0x0, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000000)) fremovexattr(r0, &(0x7f0000000180)=@known='user.syz\x00') setns(r0, 0x2000000) 20:19:08 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) ftruncate(r0, 0xe5) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x6) 20:19:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85fa0)={0x2, 0x5, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x60}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) getsockname$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) 20:19:08 executing program 0: lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000240)) io_setup(0xa14a, &(0x7f0000000000)=0x0) getegid() ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000280)=0x2) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f0000000300)={0xe0400000000000, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000002c0)=',', 0x1}]) lseek(r1, 0x0, 0x3) listen(r1, 0x101) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000040)) 20:19:08 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x9000021}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0x300, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0xfffffffffffff6cc, @bearer=@udp='udp:syz0\x00'}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x40000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 20:19:08 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000240)="b94665a08828212769b8fa565e16292159958890ddf6358c6e8fcf4576de6f23711be06190cd28abbdfe9046d8ff5f919d84e143e9b243b11127e219dd3700b47674333cf51e9c25711efe29cbca50f925316560e898251fcd53d4c56b7d19df1949b337ee6e47119e2f4f906873f008ad036bafa228d21d21067e7dcc873e1586fe716d2dfbc898c8deb8dc0f0e5d49b17cf8f3e2b1eabfdb0c"}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000080)=""/136, 0x88}], 0x1, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x21a, 0x802) accept(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xfffffffffffffffe, 0x30, r1, 0x0) 20:19:08 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x19) ioctl$TCXONC(r0, 0x80045439, 0x0) 20:19:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0x1015, 0x3, 0x101, "e97fe5998f592e3a031b37dc6744acb9", "156207aa2568160dc48f812274c2c21cab9c25b74e164370be650ec318341f9fcf49e68f66d520551788a5c30da96723f96ace7b234ecff9c7ed43e5ac0b4ba1924e76af5435e2ccaabda4f38ddd1f3e95c79803bc841622ddc11322e032f745aa558d4dc718dc662aa0ca43eaab302746ae078c506e4b96b86e8867f1183bc40b797302ccc02473af33769322178d84d1494f76589757b35af8912ffac5b46f0f42bae3c925bd7102baec2ef25455286728a177a05cb3138e7f2ed8e3f8601eda446897123b27d7b630bc1ef4317dfaf8140601398369a9096763c0b55bf417bee6a922c87f1e29b0b4c547a50f86dad7a6c3ed1e70de4a350dcbfae0aee519aaa0ffe562f237842aa3ee66923fe3316af6462ba269acef171bab5da29e745994c81eb0fb325d4f6c2fdcea68eb2c512c857409f4f6a29a945b725dde6f7a5bbe45e84dfe99f0c5ec64de8023471730985d7bb4177ab97e4e49ffe645b5b823d2e02ccf55a93be5961ecaa1fb183e165ff5a97f4526364ae3dadb917a1e0e51153b8aa687d07a981b23202ed2de100f1ceff9e1629299b0122c3abf9a914d9e4e0290993f6a6dbe2832be61515953d56f05a95f6b74de464f2e0d93c37e27bdfca97df70df82b0882c00fbc5ec54ab19b272c44b9feae9b14328ce8e324b039a340ddcc27dfdbb05f8cb096b388de8fbc629fd2171ef39d2b6b97a9b8cdef8d2513d055735c9b8909a56f65137cac7b9846ac049bc9188a9961abb07fbb86b6beb32ba190630f79d1d1b677becee549ae482ad617b06362f9024f953b44834733e677fecb08911e0d7cb2ebebc7ee60f44d9e178802b428a153a88a3a58572c93a007a11d2d887d0ed06c74a908d263bff8977be6981af94ba4e1e2d61bb70d5f45850f55657b4dd2899de93ae24107bce4b7aef557c942865e08cc391e7fa35e929e4e17445e446eb61fc89cb9d0e365e7064d1e558d4a803c549f94489ffe2afc52707747da08e71971f83ef4a56e6c0336ce66598ee4760a2701d59a8a552b0e29f804dd715ecf8bc5ae0070a98282f3b636647e9235a8f0bbaa5c67f7eed1764569f8d490f658179a8afd0ef657b5c78b71b127702909377e535e739a86c000debf40c2a0cebb557fa0e1fdb57fcac5b56425fa0c19e034926cd3b3e6a430576bf35536da1417bf4af5a5c11f5aeef7d3956eaa52c72cd976939ad0e19800f3320109c087dfcb90b93bc91e8ac122d9cbaa0ac91d9f99b92d0f131d61672cdea893ae44e88728278f49cd026ce493d34e7906f7000fa944e67b58b43e004ca432b648e61cb6a665df2b14514e1800da46b5c8d0c2ad8d6d9c657e54dda2c391b75cf7593a23684ade50b7d25efef4d37c9796ae91bee2c2aaec164d46bbaaf7aabe9ee1f1a9079739f9dfe6aaa64424f08c8a9e8d838a094a60404d0ef785138df5a0d23dbb6767510d03af3d66f37bd5b1ddd61bdf2465ab5e0825ccf20033be9969dd2ff2e918f4dc18a82536aeec4497bdef5eb500473e63c4923659bfa792dc4401aa6ba590cb45f4b142a206d02a831149d3057faf6802c2944f446ebf4c47f20a345c6d9b3e8a0f464c79dfadf8ceca224a2140764038f650d448754e7b5c0e1a43ee714f31ecddf8660fb056b4c04312a7e18978bdca8e514aa0ca0bd21a8198160d8c5c30d1434614324debbbbab8fd0ebd094fef19846b7de2b8077b63e2504ed17df9e1456d50b89c9b5b0d9ef4115286c84a2db46b6fe0be4479e3d2fd12fc64477face4cf585402a061a59f15682378080f6373175f890838e37207d0e9e2fc3aaad2e71a103073de8b61ac4b2e1cbdf7bc07e655a3ae676345ec4df9b8de02f8965eea52ae9438f5370125f2f8c1a6fd1019ca77a3fd5145d8e549752f4d2d40c6f53ed36d15b94d76ddf65bd737535c613a27adeb9f13194c392258a23f2c1c1a396610b8ec040cfa30fd6f63333d93ebef9cfeaacc0c7abd6c38906bf00577c0162235acd09f0e2ab2a1561b34232303bb049fc39d97671b4a09f61d26bea1d36d628badab38979ea140c4d45f42e703f0caa225de152680ecc57b3fdcd94dc38bb9370e2da0bb84b2862d00f0e78baa09f463cfb8e47a43eebbe2dd997bad5793fbb7d753749192f2e9c9fd22a5a92dfb04990d58a1a6d217ed85321ecadde73b78c4667789e27f983bd893977069d70f503bf7b3f40596e7580586518507d50dbfb9b4a2a23be0dd83fb8b76c0c5a3827437986a3e2f9ff5a006e4a2c83d360af8b021494275356470e802b2d7378b26358ce1659acdda6b7ec898929fbbae6e3ed7ea52938feffd17f873816492c778418cddaaed38cb939adb9e551d5588c8084424e07bf8be552a27ee20f14db523dbb46c059047a006f6a20186d9b4ee48afb6e166a367929e5c52ca22a66d0ad62ff7daf21af8e3e6944af830ccde258e0010ee9ebec21e4eb7e7c5611d508efc820a0c57a2ef37e1c0a170ee6136bc96e6edcadf683b2f0432cd8abe22f36a21214c01771d7f64ad7482e00bae02d9ff3e4aae40a58d628dd0ea94f02819cd01c0e3424830915ee37b8b2665146a4b1d7ca1f4944e4f1234dc6a580c1ad0358a792e9973e61b1eb2da95f7efbd40718851cd8b9a0aa0d43f0b092a5dabd8a1aa215839298225e83d355acaffed8109724146bc5544262e86b6ace5558a5cc294c4e28552b6d87b3cf6cfd7757afaf0b1cbf02015a02439f085929d45532e6f523fab42752554dd08ca59751c61b843f4f749ca265206259762cdd954e33bef16f59b56f57ff0a1b4f6fe92f63fc0a770e7e8e3dffe1428e155f77e35c4b8cdc28caaddfa187c2f56de22d7cbd8dd67b0312edaac65cca1d838dbd5941265f1c136aa8b6146848538fa50f44960f661cdadcff83a0fbc21a47148e123f2b2f2a4a16329c466257a270810c66d3eeba48739ce10e304b543e4117b7c0ef0bf7340804c59d80f923ece17b904d3b97163304151810e05790e087cd8b79d98ea3b75215e262d41ddb8c2c53d28f43a9314196e88d0c20c02be2316c8f13b68c49159ae38fab05bda0d878c3dfe6b5d6069814e7984278d97b6fe388146973a1d7c65e8635a5e45401adaf76a3566828a38680260f485eb5bb94ef0cd0c4c53ecdf7980d9ae65f42d71a45ffa60790f91aa2eeddfede9846eeeb9ad6a7ff6890639e8fdc493d018c9a7c2bcf44d9b8b4c81d507b08b59f3d7d1597ecc42c9188e0142659e346af305d3987a3962ae4801ada17717102ec8d822e18ac4739ab76acc91c488c11232f2a2b5ef6a79ae011840f2b59002e8868473310ece71e4becce726914525b3d23b960486816ade45ac555a2d4a2bc1143e96719ba17826c72493857d43c99f8d6926828a5ce3659f72e979c0d09ecbbba36a88ac592d500e0894d4fdb0d000536be63aaf3c2d05a5b4e10efaa2cd49006d0eeaf2e449193b93eae2b0e8ed6a43ac499193307103d8aba6ce3374fe64ff1a7f25e321c7e03e24345ac03b8a77abd399eea8bbccf9ce5d5f20bf3d2ef38b23b428514550ead5d2256f107232a4c2ffabe48884dff9f179b704d91dda33f552b92d555939a0c9fb9fc1814a26b1add1df9cb3f3e8a4815b82f88b2fc58671199d3566548d45e93817a33ccd0d901f6a8d19df1dbbb25b5edbb379a868bf265ad3f7ac6e9f3d67cfdacc9d938b1b64b6db5254e69949c2257c19556cf28b807413cedf5b167c43366d8c04b8ab72459a7691c18fead81d28f14154757dd85bae0e97cb6c7fd61892178bdde99405f135ca739973c76b3cb38fcda30d94d5b69750f7b52c4b1ec519f4615a547bdcdb3e3c25a4f6b8028b9fc42c3332f6f2e352b5c5694ace09ee1320c82c59a14041b7dc44630b160273523da2e290fe977969f7afb799f635bd60b70d58b9ee89cd99aa406550b1ae4b3e5473e9949ac03b78fee366ce1c19176edf9f68337c20730f2cb1978abfbc2a0263a22275cf110d671fd069c0403c9160d403d23a94b9b4e3bdfd30c7cd9dd6946604832ab792fe0d233a845f1344b99547d8780c798088cd1d90ebf9092b8ae9a5e27d28ec7ef336105a1f97afb1d7c367e1b889d7e691530c8e0842095f7df1d8e5a315e7744b687b0156352aa142e9bab6c91687b0cafe63fd01441b81ee5885cc1bdfd11b896567d9420a57853823da2113c9c166104c9bd6791f0a90ca1b7322ac86158f1b72afd7c71c1d80271e25416ffcd2835c09d53f224db06e7cd88de198cb255ce3ac3f899d915c250a08273b53b39151025fa3a7ece59f9ce99f6eb2b02602eef7dc839c25af69ed413520045cd6fede6c85099114d8d2f4c4bd3c121467977b3af33510d25f6bfee05f5d24deaced7be5a655c88b36ba0f99f0809340002e20dd680b0f4280b1a36ffc037677b5ce7991a9f2abbf635905be709920f552406ed242fb72ea259ad32629aa262ca3da9a50d2d2c34d083b310d5abcf3107e1048ff2e8973e39687f397959514b3b1a507ded8825b1e11e786001e9d335f31d5ae0a9ef60f6ca1818251c925225fa6fb36d165b7bbbfdb5419aab43d2f8e055441da241b7a318f9c4dc738a778db57f85a2992037167b1f53aa9195f7ab7edd42e326aa1a0aba223c80093636aca2dd01692ae20d8fc64fd98d99ad6ca49e78947e9525659d3370364b5dd00c9062b03de2d33022893deb2f48d0662543752c8e230214a73dce2e1c008e585696bb6a7d9321737981ce961df511e023fb5dc4466e4dd550d61816b776f51fed94d2f8afcb987a9715ff42ffce1c370ec0a12750af2908d597adb7c70739d1002537272b47efef393fdaae1c4d68acbcc9cfcb4e70170a33c848e44cc92e15d8e2ea538c42cbd2bb93ab1335e88fd9a183e6b43a414011306bb3256a01b47f61540d8b15e7c282fe20975cd0b6bf6aba24b4c25ee6ce1bfd6526f8d2cdc1296f6b966ebe595e7b323bc3bee1a3f9f1e4b8ec2cc43c3a5945aa69253382363d029903f9d9f2c9668a3e5c724112185607f4a9c485a7cf98762e353ea35bcb4bce9930a4e9a948429d079ddc7ce7f29ffac4f1bbb1e51dc0bca44b05ed913b247d25109d624ec06616dc08c505e9995c61e3590138b8672a1d529780f6ce7795956f3462e46c6888441f2011e5416de03ae00501d82d93d24ce21c8e1713202c8ccc209f0e28ffc21a1314dd0412eb0af2469ebedada7b40ec6f269a8c22433aea9798977998d56382e723e9ddebd13759e8f5cc5152d38cc6e3aec54a25a8b7412ce0de4d54e06add36914381411b467ec67804783a1779b1907a349f335161dd84626e676c13fa50dde8da09a869906a774c9afeb131e5a97ba442f85afd4b4d2fc34caab1c4501b36b8e185356c1972f5a66eda83e22a6d444674975db46a8bf2546d21ac034b4463e376c94e9fae44befe84b28beb0fe5a5f152b8e0626a1da044876e5b0544d737c3aea08f2722cffbf2637088f8da70d10e45551f2fc00914b06a7a539a74b9d3a2611e807be43a33d7c8e17991de25878f565d43217a709da032e4ab6dc65b8add3bd6e779457ff1e8bec2104da6ffd84130ed826b31a1bda11c520c5de4c2bb05448fae126736386bdf05b77e3639ab0ddb60c2fbbecc3cd1a587e9dd7a92c6269e83666cb777e244417d765dc5f28afe684acb222b7ba5eda34c682940b98c3e968207d00e2b9d4fb0de7e6647b299b235a327ce428344cac8edba83fd89449eda2b78349ecf23d3fd8deac304bbce6c22f339a4dd6d7080cc46ad0"}, 0x1015, 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) shutdown(r0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) bind$inet(r1, &(0x7f0000001480)={0x2, 0x4e21, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000001500)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000015c0)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x808}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x14, r4, 0x0, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x40080c5) write(r3, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000001380)=0x0) r6 = perf_event_open(&(0x7f0000001300)={0x7, 0x70, 0x9, 0x1, 0xf4, 0xfff, 0x0, 0x7, 0x2000, 0x5, 0xff, 0x1, 0x10001, 0xff, 0x4, 0xffffffffffffffdf, 0x4000000000000, 0x4, 0x7, 0x1f, 0x3, 0x5, 0x5, 0x34, 0x5, 0x0, 0x459, 0x9, 0x87, 0x6, 0x3, 0x4, 0xffffffff, 0x4, 0x6, 0x7, 0x4, 0x6, 0x0, 0x101, 0x4, @perf_bp={&(0x7f00000012c0), 0xc}, 0x48, 0x0, 0x3ff, 0x7, 0x3, 0xfffffffffffffe01, 0x416}, r5, 0x9, 0xffffffffffffff9c, 0x9) read(r6, &(0x7f00000013c0)=""/147, 0x93) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:19:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000780)={0x8, "acc647b674c3abe1bedf37baf618ce8e9f80a50ec4e13431fb9addb1702353aafd4cf28edb7d1c6933bb3b79b3c798ef7221cdc99551a0b4995d3c969294eb779ebce46a948c6d7ea8178bf0e8dd3c82c628092e37c26e09b2157f1a3e1237ffb63c3818217be1cce196c9ad23e68f21b44ad9c87d8a63a6da50d82ada6f6a76bd07356e33885d8c81ce35bca88e6bdc04669de867ba9fef1295ed5f60b89cca87ab865719ba6fc3a66d9f9364ca1a6a06c9ba57d8cf40212445d6904b68f3d305086ec7f99302c9250a728f6af4add63d307550732d0882ba37bab5590bf1db4a4c4f728a61c30b0824384bc2507bc502f0edaab15091dd83799c41b50914a365b4789aa4f8efdf940fe7dbfc4e4709c7215fd79f91e715f9958e1182c5d0d663b590cd9b52a77005a551c05c54df6479728915f80a33f831540f69ca19b86019ba33bdeab07cccf43a5fcfa5df8bb0c31f45944fe9e1880e32146d1c5fd31fb8e817cb1d450ad4f356899d689a8c28773ad3967437b3238bd6ac836857c0e4de1b93b9fb88f86de3866faeee672f9bf9ddf5edaa77113470b98814e08715abc3de06ea8448ca9421c3363016550572aa80da124b36959ecf86dfd53d55559f7295368c7368e363505a18af2fb2f9354f6eef06a04483148786d6fe5d23cbb6b526bccac8abdafb912276d99f843be65d70e765af0ff2f2ee17c1928c37ceafd34d1315a2a48d48d379644974f26718548db68feb4353776b8af8c564d2047669158e16271dba38742c48be165d6ca0c90506cee6bf560524c827a5929467387d2cdb0db8a4d112683ee393592a485886edb77c6764d670d93db633e271c238760bd5ba57facb9f6745ec0b86ebed739f5ef7dbac5177056fd107fac1bb4589756ac9af1390a1e7dfc7505f4b01463305abe5280b9b3c92ca201d0142dadfce58dd478a7917f5ba4bfba971f21c09dcd3cc0d3dacf2527caaa1dd74424d54bcaee398fc8d2d027735993303bccd760ae94c5eb317d70fbdb32884f31e9928b63c84dc238efdd105e2bd427e8dc9ffcf1d520e2484679aed907e82d6923c4ec291e4c8011f1ed2995f8dab255ca6a2d5798ea5ece5e3c6b28daa09b0b267c56d20c254b022ee0d7981dd1963ba12a841a7de6501432f9f75702fe2a1c90738b6ed1977902fa9cb5f295d13eaf60e596a296ad78c5e4a81548c0580999d6dcead0cfe885b7457446b7fc119b381297b8a59d5e3744b3f10c434f6566fd056c251282f2b922d54c27cabc191644ea120befbfe80c1b94689d23bee311a7904615fed3868cfd9886831cc2aefc3e1ce8aa3ed9d7196745b9f04ec6069c6d1c53bc2c5eb982a83b7c746d2333f450ece76ccf782790d3341508e4ee11d9b5a7cb155267d06593c0f44f24423d6735a4d3522933272869aa03141bf6bd12306a375c2ae233d926d4efcbcb0c6ae982b98aef9436cf61337b5bda21f3e63e87ab246146aaf1a1854c846170ca5593862ab9d15db0fc8f4f4a60294ff57dc778685c95d6763a92dac1d2b3097e609812504ed9627d47e26a0229bba77ebefa022c5bd2cb83c807930ec9255cdf14ef48b0585223ac38e739fc8cfaff578867e8586a0e49fe7eb0b92067785f17cb46dcc3cf78b562ffd11528459e645d36624f8b6d99eebd60c38668b59f1111f828a45c15ce74da4b5d034b0f8416e835dd234a40600afc357c8913ffb0749d96befb2bf38db21bcc7457cfabd3717da2d00015358eb36c0318d9dd5282f559e40689ca1b0b7000ca611f579a10e126125194d3a1c8d00dbbcec9e905a7d3c69ddc33f107f498fbb61e985bfcba65d8e3bf1e580545ddcdb688440392df23c52411fb6f1bd3060c96331ef6486fa3f919877d28b62d99ab83357f2c5ace55242d669418655e7b076872e95470abbaf19bc9bbe74c77e7befd69e4573bbfb4722104c46c49a37ba5d29655cf79e1fffd7a1015c5173a6e58f73b162ac41518d0fdb40902ec747c305e82e3b327be7b4d31e7e7405f3e4a4cebf2dbb1ee4834458bd5d3252200309c2636a83e8dfe6f692b820f7136f69e6d5002928781b77038836dffcaf2e5fd69238a308a2042ffda0483c467411610b4c4ff5993e7768f8a93f7ca1221254eab682ebd426a7631e86b8ba6cfe019eef69db7f9a5daa6e39022406e7d7dd092b727130473e9447dda62fae897bd2453428e6e5a04c069dda9dd44ac05b4d4ce055e99bc591c87bd459ee9c9c6746e4ad66239f413356cb1d1605f3c507adf60b0c3fcdf724076b512465dc0cb648040bed08f47d9104bb825db1e8336d6d0aeb72020d530316da3aab0a8bfe8dd904e7d5767e2ea30eabc4581004adf9664fb6ae836857654140a86a8762c55a8c2faa6c33954c666213cdbe554483619b1ab923f5604f56d85b6e33f8e022f07ed940893b9457153dadd8458644267d35aa2c74499ff1f82811ef8906bc659c93ce47c19ecaaa7f27f5acb20d15783d006790095ea279f325bc3b5ecd37327bc0fd2bf6efe8762e17b983a111fe7bc9e54e43a43a1030929e19f296d459aaedd88ccd833b036f4245de214995e26dc156f402fc6d62df5e831e78079dd69e1847840d11e28671eec11d1914c28a3d4c1e47f053781818e242692d422f522de195aed1c8f8dd5e52a144d42ee8a5ed8cffd8c06dd78db448376249bd4f976988ca49e653f7434780f6522d7ccac17cbcbd39ce4a0765e2b59d4e3d5dd0e29010d30007e905752d034a93827fd3c8e81b423ca5329bc8dd5722122c8a5913b84ae017098fc13bd30b521f7d7f803fa5bc27393669ef988bf6343d857a46e39599231b399f25ab4b3249b520cbca96ea2de357d330f0d9fc2566dcc9cb30821a6b22a43650361ac05d766915f9bc0089537ec9bf8e6173d056140e4b3bc10811eb32cc2443ce63884c0aa2a12876d108d94dae1f052643a57472437f6a85db567e23624051f106a157c67bc8b7843ff8b06d313b8ffcb7ad1851dfa4d2cf2f883eeb0eb1ccd31275c3517b6b5149172a0bebc12043f9401cf3997fea04dd7120c0d13400a65278dabae611ff1d080ff3b7d5ab9fcfefbdd40ffbcaab1b186729c3a06aa0f1e948993980bb65425196ea3e06de0c46b7fd9a356e9bb7e75ce07f311f4d2aae261859e212a46fde738d802655cc8a0c9d153fe9e58ccb880a7fcc7ec10e0face71e3b9aa1f996957ef4dcfbe9d9c9bd077d108c73f120a72e8ff1765d8ec307c63d3f5f38349a1e0fb3e3b586dcc82cb0867098b9e59d0edadef0082cbe53fb22b9880e04ed53d280e78547955e406de2bf5bb05dfa2ba7e4db6e9ca79470bdd0d0c2cd691ff58c7ffe1957e6b36b9ff36bf9c71402da96efb6bab8ae98282b7872e5c5d2d480b5d04af86e8c2eb3ecdc04a514dd431240aaf4040298b8445b47698262d2bac980e64b3377b4d3316e0932d65dd95f199cf4a6273a3be2bc825660ab952d15df6da655b4470b91be1809022bdba2adfd95957f7780ecd8a70524154f3b7943ca9f8d496c7e09dfbb023cdb6191445c62be76dd164b703c1f814fe496353b12089549863b8ab78f581612cad3d8e8df5766780f04b0fbf0c2ce3335805b1ff671f37016ab33b203c05fcfa494617165bff432c8fec4cd8f6b89688492c2b836641d4e7f9a174262284393aeafbd4b89679ab51581a962cefe66192df2a4667ec6f53ece0951f37bc56097cdf629a932ea250e996a3cfb1d04a1b9b4c8703129fc9696790939816e278a9e49c9fad31d1042bee2362a3ab071814f6450afb67f6c8812b3cd52b1b8be6b9eedddf4a551254e5c3dca56d9f5242274aa8a9dd8a1179ddbec57956c7672b8390379fd75d1e7ae9c2f949f56bd5d922b7ec67c560eff47acc08a62410c1ca0454009e9bb6347a711ad093db30a850e7b169647a3437a6ace6a94ebf60f0b0f3f24f49200e72e20fd724adcf45880425eab0354934e22a8fc634d0b8f083779cccd6aeff6d7decdd3ef47ca81ddb1e7772986a605e1443381b3ef5491589c099ea76d774e83be6e9d1bfd5c26510f0f61ce4851b6e21fe68e92116a822b8b06e32aba66968625f485304566e0b7828b9dd62d2f5e4351fad9f24ff018c44ab5282a4d8255ce38d674868236f7d56949432658cde726f0912a4429cb897b1e5341aa15adaae1265163804f75e721768f3c60ba46149adea44d7594b10a4494188d6e719ea0b337075396a4052d95a2eb2b1fc84cd2f687b8f9949d20cd09a93996d092a3c0684eaa3bb1c2231b8667630ac7a2dba484e32ef24424be10e4788f4051736fa6bce06e10f6a4d0cdb392626feaba21a7df54d476b1ba566db3718a458986a50291e3b82774e33ae4360d5b8f1c09e433c0776b163f6e51aa3ddfeec2d8baca0368a0ba1098ff5f90b0d9ebed35dda98a571908f5d8a5b5ec7e6821d935a731300d4998f593420d5b45fabe3b6485d95c077a950b3063f769a016522f32379f941d3884c2d8b71c7f834db239baed05b8baec86550f9dc5982018fdf8f2e3a4574ec1a6a7abed8c9a87e13781344e7c2b70d765206cd243f0ac820d5d328a6379fec0ec3db7b190cf0fe64ecd56dea2c89c49cd805dcf2673541f4035f4199b69e338469a2fbfd8d13f8af89ee68048222cf0615d090374dbdaf10650e7bc482cc9d33f6bbd9bfeb33507ed39caef4c10bd5abc5a678b1146406ccb65e9e730f38f8ef1030a511013ca459c080c06ddb301d98f78b2d7254600d7529c9805c4487a688818207d225c304b5a0458205d0d7dd26e24a583f66f9cbf1810e1c7dd90b978177a40b49a0d6dc1c6ccdc8a3a7f53b545fb439fd11692bfc68ca6537cb13ad44d8553fbe5d51b878e7bb6d83d80d851ba37b12c48751b8cec5aa6323c89772889a1536cc317a82f79cb40439a8676345038b81670b7268dc4613b9ae40251655c9565d3b2fa733820e38a61e8a7cbf89adf8ca7c95419c40f781ad834710072bd530393c7fbdd9e62668dc201c25a74628ac3fa4854f093cba2b3942b2a497e54e1ad7eea9552692e660a2ed0e20a6e20b5006ea642484e945cab698fff48c4ae52ff6db8a6e82b97eb2d35b9267a478786a12b1e1abc04db6d9bafc64602ac14403bd5f2abae63e11a3f74aa482ca85bcd3dde8e07d5bf8bac78c7c71aeeebe264c97551a901fe2f03cb026ebce58deec83596224d7ef7075053828ccc620bddbadf7d830823ee4fe3958b863d29a5eb8df3a4a522b5094a673680dca5219362523610bdf94e077a223750bd93a37f1e62460858427fc909af727274a7cf0e2ae37bc671b6b2e5c928e715f6ec7ce7708df95d3c5311c567521b29f606df4fbb7297a9274da2ccfdc9651f91ee5e86c8cdf1c82ce713da96554a32194f83001b0e784f95cf35281400f12fc09c01af9ec1b3f06f96185fc660f06ea7cfa3f7abd767903db529961beb3b4d312b4815450b2225e10dc529608c04c99f9c5fc1e1b6457afd5da4b5a2c2ede4d2f337630a1d44afb1cd9db4b4c9d687a0741c6b1418693b92c40ec2f8569cc5d88574aa464af0dbbc9115cd6318ebfbf6fe4bd690f91945aaec931b00135630368ea5f2838f9104c483df768be8e959d301a5b2be0c0b1501d56d100da387948e597790b707d52c8059b967185ce914e0760bbafa5e17e116c5044596e639adf1c75d150a6d824ddc047579716f7c63c731c0ca6cc388df3258db9f411e2b58aace5799866d9fdf1f43da8f27a4fca1a90817e7281b39b5dfd517", 0x1000}, 0x1006) mmap$binder(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x2, 0x12, r1, 0x50) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:netlabel_mgmt_exec_t:s0-\xdf\x7f\xd5S\x80T\x8ah]\xa3\xa5\x9f\x9a\xba\x85\xa9\xfbK\xdf\xdc\x12<\x893\xf8\xf2\x89\xa7\xe9\xa3\xf1\xa6f\xd0\xd5\x05\xa5Tw\x13Z\xb0x\x87\x89\f\x83\x8b\xfa\xfc)\x06\xc8\xf4 i\xb2\xb3\x97\x03\x82\x9c\x9a\xd3?\xa5e5\x93 \xf2\xfc[\xfdt\xfc\x84\xd2\xad\xf5\x9d\xe9\xbc\xc0\x97\xf5r\xb5\xcf\x91\x03^\x99y\f}\x8a6\xd8P\x84?\xe0\x9f\xdf\xf3\xdfE\xbb\xe6\xee01#x\xce\xba\"\xf7\x13\xdcG\v\xab7\xb4\x0e\xf6\xa0\xcd\xa7\x99\x90pY\t\v\xb3\x86>\x97Z\xd70mW\xf6l', 0xbe, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000010}, 0x0) write$P9_ROPEN(r1, &(0x7f0000000100)={0x18, 0x71, 0x1, {{0x1, 0x3, 0x2}}}, 0x18) syz_genetlink_get_family_id$ipvs(0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000300f50000000000", @ANYRES32=r0, @ANYBLOB="00000000206100000000f100000000000000000000000000000000db547d901400", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\t\x00'/28, @ANYRES32=r1, @ANYBLOB="000000000100ffffffffffff00"/28]) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0xffffffffffffffee, 0x0}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) 20:19:09 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x8000, 0x4, 0x8, 0xfffffffffffffffd, 0x9}) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000020c0), 0x15e, 0x0, &(0x7f0000000000)={0x77359400}) 20:19:09 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x181000, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000200)={0x401, 0x80000001}) r1 = perf_event_open(&(0x7f000001d000)={0x2000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) fcntl$notify(r1, 0x402, 0x80000026) getpeername(r2, &(0x7f0000000240)=@isdn, &(0x7f00000000c0)=0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x10, &(0x7f00000003c0)={&(0x7f0000000300)=""/179, 0xb3}}, 0x10) getpeername(r2, &(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000040)=0x80) socket(0x200000000000011, 0x3, 0x8) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setrlimit(0x1, 0x0) syslog(0x2, &(0x7f0000000340)=""/103, 0x67) 20:19:09 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000002200)=[{{&(0x7f0000000880)=@in, 0x80, 0x0}}], 0x1, 0x4008800) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x11, 0xfa6, 0x7c7, 0x3a4, 0x3, 0x6, 0x4, 0xf6, 0x40, 0x15, 0xefe, 0x4, 0x38, 0x1, 0x7, 0x0, 0x5}, [{0x5, 0x0, 0x3, 0x7, 0x1, 0x8, 0x1f, 0x5}, {0x60000000, 0x5, 0x4, 0xffffffff, 0x237, 0x7f, 0x9, 0x4}], "a131d01bf1822a7125a7c360353b7378890af97c2de53320e4", [[]]}, 0x1c9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000080)) 20:19:09 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x80045439, 0x0) [ 1223.832286] kauditd_printk_skb: 318 callbacks suppressed [ 1223.832296] audit: type=1400 audit(1554668350.025:50356): avc: denied { map } for pid=27113 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1223.879219] SELinux: Context system_u:object_r:netlabel_mgmt_exec_t:s0-ßÕS€TŠh]£¥Ÿšº…©ûKßÜ<‰3øò‰§é£ñ¦fÐÕ¥TwZ°x‡‰ ƒ‹úü)Èô i²³—‚œšÓ?¥e5“ òü[ýtü„Ò­õé¼À—õrµÏ‘^™y }Š6ØP„?àŸßóßE»æî01#xκ"÷ÜG «7´ö Í§™pY ³†>—Z×0mWöl is not valid (left unmapped). 20:19:10 executing program 0: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', 0x0, 0x0, 0x0) listxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x10100, 0x185) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x100) 20:19:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000090000000000000002000000000000000000000000000000e453149f434ebd26ce40fd3f66ce725814e02563a46e7c57292bd534ad3c4628d8cb7e1d555393d6f3de03ee9db4a8c8eeb7debae438cc9dd3c7549d4b00a264e4933c45f04235530e217a539eb1b351b08f2eb6c575372a80428402a384584e66767e21326b6d4cbac7bc0b524a678db2c78f301933a7905f93bda10f7d69d4f7c8ba7680ff17f87a034482b29b55ca8a639fbd98188c1612faed044af5bbb383a9ae44332a27d9a85afacb280def89e3ce0be1731100"/229]) [ 1224.065021] audit: type=1400 audit(1554668350.065:50357): avc: denied { read } for pid=27102 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:19:10 executing program 3: getpgid(0xffffffffffffffff) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x84) ioctl$TCXONC(r0, 0x540a, 0x3) dup(r0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) r2 = getpgrp(r1) r3 = gettid() ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000180)=@generic={0x3, 0x9, 0x5}) rt_sigprocmask(0xfffffffffffffffe, &(0x7f0000000140)={0x81}, 0x0, 0x8) rt_tgsigqueueinfo(r2, r3, 0x8, &(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080)={0x3ffff}, 0x0, 0x0, 0x5) [ 1224.208329] audit: type=1400 audit(1554668350.075:50358): avc: denied { mac_admin } for pid=27102 comm="syz-executor.3" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 20:19:10 executing program 4: r0 = socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x3b00, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) dup3(r0, r0, 0x80000) 20:19:10 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x1044) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x7) accept$inet6(r1, &(0x7f00000003c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000400)=0x1c) fsetxattr$security_smack_entry(r1, &(0x7f0000000300)='security.SMACK64EXEC\x00', &(0x7f0000000340)='\x00', 0x1, 0x3) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) write$apparmor_current(r1, &(0x7f0000000380)=@profile={'permprofile ', ',-+-{}^\x00'}, 0x14) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f00000002c0)=0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast1, @in6=@rand_addr="dc87f6a3e61c99b371b62f9ffca12620", 0x4e23, 0x0, 0x4e20, 0x4, 0x2, 0xa3, 0xa0, 0x3f, r2, r3}, {0x200, 0x9, 0x6, 0x31ae, 0x3d, 0x0, 0x800, 0x20}, {0x80000001, 0xb72, 0x4, 0x7}, 0x2, 0x0, 0x2, 0x1, 0x22f4055183768f2c, 0x2}, {{@in=@multicast2, 0x4d3, 0x3c}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3503, 0x3, 0x0, 0x101, 0x4, 0x7fff, 0x8001}}, 0xe8) [ 1224.356141] audit: type=1400 audit(1554668350.115:50359): avc: denied { create } for pid=27102 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1224.485475] audit: type=1400 audit(1554668350.115:50360): avc: denied { write } for pid=27102 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1224.597570] audit: type=1400 audit(1554668350.235:50361): avc: denied { map } for pid=27122 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:10 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1009, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000200)='./file0\x00', 0x200000003, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) [ 1224.767921] audit: type=1400 audit(1554668350.245:50362): avc: denied { map } for pid=27122 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x3, 0x0, &(0x7f00000001c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x1, 0xfe29, &(0x7f0000000200)=""/195, 0x4, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0xc, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4}, 0x10}, 0x2ef) 20:19:11 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, 0x0}}], 0x1, 0x0) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) 20:19:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) [ 1224.917344] audit: type=1400 audit(1554668350.245:50363): avc: denied { create } for pid=27093 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:19:11 executing program 5: r0 = memfd_create(&(0x7f0000000300), 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000200)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3) [ 1225.040241] audit: type=1400 audit(1554668350.305:50364): avc: denied { map } for pid=27122 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:11 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x80045439, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x8, 0x5, 0xf20f, 0x101, 0x0, 0x6, 0x6004, 0x0, 0x80000001, 0x8, 0x1, 0xffff, 0x9, 0x4, 0xffffffff, 0x400, 0x4, 0x6, 0x80000001, 0x3ff, 0x7ff, 0x5, 0x6, 0x4, 0x3, 0xfffffffffffffffb, 0x2, 0xdc0, 0x0, 0x6, 0x3, 0x3, 0x10001, 0x8, 0x0, 0x902, 0x0, 0xee, 0x4, @perf_bp, 0x8100, 0xa0c, 0x4, 0x0, 0x80000000, 0x8, 0x6}, 0xffffffffffffffff, 0x8, r0, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a2a00, 0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, 0xf, 0x8, 0x300, 0x70bd26, 0x25dfdbfb, {0xb, 0x0, 0x5}, [@typed={0x4, 0x81}]}, 0x18}, 0x1, 0x0, 0x0, 0x810}, 0x20008000) [ 1225.180321] audit: type=1400 audit(1554668350.305:50365): avc: denied { map } for pid=27122 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(r1, 0x3, 0x0, 0x408001) write$eventfd(r1, &(0x7f0000000280), 0x8) fallocate(r1, 0x3, 0x0, 0xfff9) 20:19:11 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, 0x0, &(0x7f00000002c0)='proc\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0), 0x4) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, &(0x7f00000002c0)=',') r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 20:19:11 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000001700)=@ipx, 0x80, &(0x7f0000000100)=[{&(0x7f0000001780)=""/39, 0x27}, {&(0x7f00000017c0)=""/46, 0x2e}, {0x0, 0x263}, {&(0x7f0000001880)=""/123, 0x7b}], 0x4}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') preadv(r1, &(0x7f00000017c0), 0x324, 0x0) 20:19:11 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x10400, 0x0) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) sched_setaffinity(0x0, 0xffffffffffffff79, &(0x7f0000000140)=0x8000009) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuAcct.usage_percpu_usi\x7fer\x00', 0x0, 0x0) capget(0x0, &(0x7f0000000200)={0x0, 0x81, 0xffffffff, 0x0, 0x0, 0x8001}) dup(0xffffffffffffffff) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x70, 0x5, 0x0, 0xfff, 0x0, 0x0, 0xf2a0, 0x1, 0x2, 0x2b6, 0xcb, 0x4, 0xffffffffffff5980, 0x8a, 0x0, 0x7fff, 0x5, 0x40, 0x4, 0x8, 0x601, 0x7, 0x7, 0xffff, 0x3ff, 0x8e, 0x0, 0x101, 0xffffffffffffff5d, 0x180000000000, 0x7, 0xffffffff, 0x9, 0x1f, 0x5, 0xd78f, 0x92, 0x0, 0x3, 0x6, @perf_bp={&(0x7f0000000000), 0x8}, 0x840, 0x0, 0x9, 0x4, 0x0, 0x5, 0x7f}, r2, 0x9, r0, 0xb) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x317, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x200100f1) io_setup(0x0, 0x0) 20:19:11 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xe0, r1, 0x500, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x8}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xa, 0x31}}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hsr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x25}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x16a462fb7a3a7a49}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x5}, 0x20004884) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000680)) write$P9_RSTATFS(r0, &(0x7f0000000100)={0x43, 0x9, 0x2, {0x100000001, 0x80, 0x0, 0x401, 0x5, 0x7, 0x5, 0x9, 0x8}}, 0x43) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f00000003c0)={0x204, r1, 0x402, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x88, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1000}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1000}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xc965}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @broadcast}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffffffffff7f}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hwsim0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}]}, 0x204}}, 0x80) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="1f000000040000000000000000000000000400"/44]}) 20:19:12 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000000)={0x2, 0xfc58, 0x7, 0xff, 0x1, 0x80000001}) 20:19:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x800, 0x8, 0x1, 0x0, 0x400, 0x0, 0x2, 0x7dea, 0x0, 0x0, 0x0, 0xfffffffffffffe00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syslog(0x1, 0x0, 0xfffffffffffffea2) mount(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x10000, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=0xfffffffffffffee7, 0x8) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0xc000, 0xfffffffd) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e13e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) sendfile(r0, r1, 0x0, 0x10000) 20:19:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000080)={0x5, {{0x2, 0x4e23, @remote}}}, 0x88) r1 = socket$netlink(0x10, 0x3, 0x9000000006) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a02000000ff81004e227e00000058000b4824ca944f6400050028895aa800000000bd00008000f0ffffffff0900661da1fcff0000040e05a500"/88, 0x58}], 0x1) write$binfmt_aout(r1, &(0x7f0000000140)={{0x107, 0x1, 0x3, 0x28e, 0x3e1, 0xfffffffffffffff9, 0x384, 0x5}, "e59f96a88b61db12c25c14b4cbe25f", [[], []]}, 0x22f) [ 1226.158229] tmpfs: No value for mount option 'roc' [ 1226.260395] tmpfs: No value for mount option 'roc' 20:19:12 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x6, {{0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}, 0x7ff}}, {{0xa, 0x4e20, 0x9, @rand_addr="27a7551990c5dfc58291f6658a2d8a86", 0x100000000}}}, 0x108) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000004c0)={'caif0\x00', {0x2, 0x4e24, @remote}}) sendmmsg(r0, &(0x7f0000002900)=[{{&(0x7f0000000000)=@ethernet={0x0, @random="be14f277c97e"}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="bc94c53eb0044708ab868b9b5b55eca6cc36ddce77075031ad06030518e4ed3848b84e92d06bb88f412dda22671b560e1dd2a0073c0df32b98252e7ec1765dd8dba5da0401d7955427ee4fb3e4366346f9fa7a17f3f095357f3a7229fec329bfc5f94de9cf77d0efe4ea00ab124f378c55a385fa934be930002ed2f685dc0a919f8c7864636a70da9ab03855df2942b5134ddf68694e618cb943633e64f628bc358bd0c92c7f4299f2eeaba02c09742ab907495445b5f7b1767c35a56cce9863a1aab6cb0ace972ade29469d0cf72f1c0aa124ecba7a81a8c1321890", 0xdc}, {&(0x7f0000002980)="284eda3e16e6a88f8ead6f5e78244b602320f894bbd95ef237a25b6406d1fbb3c6f8e988dfd948240683a40de4ee703506770e92ade32c96441ecdebe56400caf724e0fff61492c1e566e0e7d67b72cf5ff4cfdea3eccf5e5cda10ef106a61583429617cfade16b825bbcd902e762eb9f61bb758263ca81c4d18f8542cf4fea100ae25867907570b4336a1cd4849128ba5e410fb2b03521b9c79c2193b59bde6f58385682ddaf296c3eacf90121066feeaeaffbcef6b3e53", 0xb8}], 0x2, &(0x7f0000000500)}, 0x80}, {{&(0x7f0000002640)=@nl, 0x80, &(0x7f0000000180)=[{&(0x7f00000026c0)="2a252c0f94e5bfeda561f0864fc2d09f545086d197ce2ceb9657b6387f25cd12b039a98af979fc9c53395f342442a30aa7f5a0a8a11ff669d4ba3665e404ef47258e8cb8ad77aedf60a3b8d81e9f33", 0x4f}, {&(0x7f0000002740)="7d7d9b25416804f1885ecb40a7df9c5e328c044422b63b4f507aee2a6d998ebcd2bc165de3f787c4444bf0340ee5d0c50afedc682293bc75e1194bb41ecf2e568ecfd51a734072fec24a5602c6520b9acafc2be7f8c4dadee501421b52bb185df04348047fc6f9586860b779b3c4ae97891d4b35bb8c4183", 0x78}, {&(0x7f0000000100)="c00e00", 0x3}], 0x3, &(0x7f00000027c0)=[{0x80, 0x104, 0x6, "9fbf052ef5e1d1f1d7886012559f27fddc1fb2a20ae865f1353ee0d3977c1f29df1c774ccdeda54c57f9922c2962c443783f6131cf4a514c58892faf36ed6af47e2e34a833ce2c58e95dd426ff6530955ef5e708f8e27608faf1dd0b429f5a9e1eba07f4eb3c2f30fa16"}, {0xa8, 0x1ff, 0x2, "fefb427edf8a79b50fe444d425c59834661f09968479d3c039bc187f05b2eca0d1ab31195ddaf3a4874f91fcc8619ad66e78127ddfbe440a3628bac4b3f5558822773af1a36f8e9688409016066fa2d956be5eff9a8fbb7216a0bf6022e0670bb334dc8c0f0720763db40be639a698478e2331b7f77c80e79fa00167999183034e1a83bdbcb7b057147ce6ddbb9e86f636c117a378"}], 0x128}, 0x2}], 0x2, 0x0) [ 1226.543139] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 20:19:12 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x6, 0x8001) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl$TCXONC(r0, 0x80045439, 0x0) 20:19:12 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) accept$inet6(r0, &(0x7f0000000000), &(0x7f0000000040)=0x1c) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000300)=@ethtool_rxnfc={0x2d, 0x0, 0x0, {0x0, @hdata="513314daaad576e0d1f7ed2815aeb4e61e4706e7e64e383364d2343dc6538613e54da150cc8f315ecc71a44e4b1d18091df5eda8", {0x0, @dev}, @ether_spec={@broadcast, @link_local}, {0x0, @random="8a616057e13f"}}}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000240)='./file0/../file0\x00') mount(0x0, 0x0, 0x0, 0x4, 0x0) [ 1226.594916] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=654 sclass=netlink_xfrm_socket pig=27199 comm=syz-executor.1 [ 1226.688014] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=654 sclass=netlink_xfrm_socket pig=27199 comm=syz-executor.1 [ 1226.688815] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 20:19:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="02030609100000000040004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000002000020000627c05000500000000000a00000000010000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x90400, 0x52) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x238, r2, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}]}, @TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xdc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5508}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x47a38408}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x42}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa3a4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x67be}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4c3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x171}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}]}]}, 0x238}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000006cb19d76050019fff70000000000000000000000ffff3060dd29ffffffff0000000000005900000000000026"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000238, 0x0) 20:19:13 executing program 3: r0 = socket$inet(0x2, 0x1, 0x2) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x10) r1 = dup(r0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 20:19:13 executing program 0: r0 = open$dir(&(0x7f0000000380)='.\x00', 0x0, 0x0) unshare(0x400) ioctl$FICLONE(r0, 0x40049409, r0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x8000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x800) 20:19:13 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) linkat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x1400) 20:19:13 executing program 5: perf_event_open(&(0x7f0000000740)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) sync() r0 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x15) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000100)=0xd, 0x4) 20:19:13 executing program 4: futex(0x0, 0x8c, 0x0, 0xfffffffffffffffe, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) 20:19:13 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffffffffffffd, @rand_addr, 0xe6f}, 0x1c) fchdir(0xffffffffffffffff) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdda\xac\x00', 0x0) lseek(r2, 0x1, 0x4) setsockopt$inet6_int(r1, 0x29, 0x10000000b, &(0x7f0000000280)=0x2, 0x10f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000180)={0x5, 0x48, 0x2, 0x971b}) socket$packet(0x11, 0x0, 0x300) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x2d) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) io_setup(0x0, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffe) 20:19:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802123001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000d40)={0x7, 0x10, 0x8000000000008}) write$selinux_load(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="02ff7cf9080000005345204c696e757815000000000000000800000007000000402c0000a60000002315c908e62da2987ab4a993e15d031da8c2433ba26697bce0b07b2b8fd84054ae87146b18cdea823343182ad8479954c11ea393a8264b48bee115e3"], 0x64) setxattr$security_smack_entry(&(0x7f0000000380)='./bus\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000013c0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9fea32dd18742b9ee469c4c1e56e9c8b22eff63bfd53bd9b54f7d6621812070aa3ed7714bdc16c13520e705c9290dc569dfcb330262532ebf8c64053c2997951777942cc164627a30e3be741a9160f0591b060089addb55e1c0af02000000000000cf89fb5152288fab659d6dff6b7892ffcd42dfabe96fa1de99ded786ec6abd654a5f0872fa0d3abd51c7b4625d55ab53c3d7009080af9ec6c82fedfc4ade431ffccb604dfe71b276f19ccb7daa9a1dc00710d8f8aa40395374ab85226babf55bf75c666052b6614cbc4fac010c95ce294d519ee921e861084dd97816c06639b249b293f84768276947f203"], 0xf5) fcntl$setstatus(r0, 0x4, 0x2000) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000b40)) stat(&(0x7f0000002040)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002180)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000e00)=ANY=[@ANYBLOB="100000003700001525bd700008dbdf25"], 0x1}], 0x1}, 0x20000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000014c0)=ANY=[@ANYBLOB="7f454c46fa03a309090000000000000003000700050000002f000000000000004000000000000000b103000000000000018000000400380002000100aa00000000000070400000000200000000000000070000000000000008000000000000000300000000000000ff03000000000000ff01000000000000ca1c6c7dc8f5056ec278239aeb8821279d87cc1c23e400149664ea375bf022d6364409f67dc42501fcfb55a0bad0509cf747c93aa970457600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007ca3e9f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000036df02130000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005e97c0334b4f7b9a69e7b29c4ed80108c36dbe3245b3253af7e35589958dbc42d806256a715a8f22fe759814b61c9b73174c86c25dd3554b80fed2513feae43d3efef99241aa08238f90fe36259e63881ed0610d8075a15b32896a52b7a576c85341c0d9c6f15dc5da8e0dd06d8df6b2ed8b266994e2d42a048b7be40833dd75841a4823e2fff81c21472e9996b44bff67038e9dc433235c3ff1c394e2798dcbc9c626a656e70e10a298afecf512c633b76fcd0cb88256714c05d6cae3c228ca23f488120501ca381bacd766d602e7b3da4a1dd123341f294bf4b9f72a5f6fe2dc5bf42ee226b4d1696bc6bb7e5b94772984985018a673ce0386165d48f66a4c59cb11226baa3a815b89d6762c52f3bdf512a3c621b4e9d0623491ee10b162160dfcd9a435669765ef5c805e6d01b2ac3fc3067d2b354ef379b1f20630abfe1b6c44e727a12bc8d60033f74da988913b8ffcda1a732df10dc44d58"], 0x50b) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000900)=0x9) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) r3 = request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000940)="8b13299926f6b1dd3b2295a24606836c2706428fcc6002f7ddc62773de1f69a180a476bae0e2268b38a7ee354efa6668f7e50367697568dd5a64ec51c32041118d56f61672cb91385af5759266c399360e6f3b007da7ce3323313a42eb4bb6005b080cd88abab8234ebe59e67b12e0c74e427c29b4b6a08fe5743015fc949c09adbf5582977889e11ef9df4903141b2b4ee281756b2b42fc399b77006943fd5e4f028d1aa88e0d36591a30cfe89d682ae4a2f14f7f0f11f270eab148362202", 0xbf, r3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x300}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 20:19:14 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/enforce\x00', 0xea6f1842842151, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000380)=0x1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCXONC(r2, 0x80045439, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x10000, 0x7, 0x7fffffff, 0x0, 0x7, 0x40010, 0xd, 0x7fffffff, 0x80000000, 0x800, 0xb13, 0x9, 0x7, 0x571faf0e, 0x6, 0xffff, 0x21, 0x2, 0x2, 0x1f, 0x29, 0x3f, 0x2, 0x1ff, 0x1f, 0x81, 0x6, 0x8, 0x2, 0x3c, 0x200, 0x3c0, 0x3, 0x5, 0x8, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x6, 0x7f}, 0x6080, 0x8001, 0x10000, 0x3, 0x7, 0xfffffffffffffe01, 0x9}, r0, 0xb, r0, 0x1) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40, 0x41) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00', 0x0, 0x3, 0x6f, [], 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000140)=""/111}, &(0x7f0000000240)=0x78) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000300)=0x78) 20:19:14 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/1}, 0xffffffffffffff1a) socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000140)='sit0\x00') 20:19:14 executing program 1: r0 = open(&(0x7f00000003c0)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) rename(0x0, &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000600), 0xfffffffffffffe97) lsetxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', 0x0, 0x0, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x0, 0x2710}}) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000100)) sendfile(r0, r0, &(0x7f0000000040), 0xa198) sendto$unix(0xffffffffffffffff, &(0x7f0000000500)="81be9346fbfe62133a6f6ca3a38fab17f9e1e94620a270a774e8eb1829c599515c5d346330a966a60ad1da7c5ef7e34bf4c3816f0214533468861c78cda91719c1b8c0c6aba330677a3e2b09442b103f029c6945ff4213607f11063acb442361bc8c26438d1abb8eead6879d61642a5d6c4d0b9f1e7bf5d5d2dd9bc6d2e4cd78dc71808cf73c69105247334ca83c2b168740e91bf382b2b7584d7331f700fb5eb98f1d55fff90da35b4ecb6baee89eea3606eb1875a8d74d8b5d0a8780", 0xbd, 0x20000040, 0x0, 0x0) r1 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000)=0x3, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x11, 0x0, 0x0) connect$unix(r0, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) r2 = getpgrp(0xffffffffffffffff) sched_getaffinity(r2, 0x8, &(0x7f0000000140)) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) mount(&(0x7f0000000640)=ANY=[], 0x0, 0x0, 0x840, &(0x7f0000000340)='security.capability\x00') 20:19:14 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fdinfo\x00') getdents64(r0, &(0x7f0000001480)=""/4096, 0x1000) read(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) [ 1228.630226] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:19:15 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000000000, 0x0) fallocate(r2, 0x4, 0x6959, 0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x0, 0x2, 0x7f, 0x1, 0xffffffffffffffff, 0x10001, [], 0x0, r2, 0x7fffffff, 0x5}, 0xffffffffffffffc7) accept4$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x1, 0x80, 0x8, 0x1, r3, 0x0, [], r4, r2, 0x0, 0x6f}, 0x3c) fcntl$dupfd(r1, 0x406, r1) ioctl$TCXONC(r2, 0x80045439, 0x0) [ 1228.868346] kauditd_printk_skb: 194 callbacks suppressed [ 1228.868354] audit: type=1400 audit(1554668355.065:50560): avc: denied { map } for pid=27254 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0xf2, 0x1, 0x2}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006003194ca93728b0000005000000000000002000000000000000ff01000000000000020000000000000000000000000000000000000000000000000000000000000001000000000000800004000000000000008000000000000001000000000000008100"/512]) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x40020820000, r1}, 0x2c) [ 1229.068598] audit: type=1400 audit(1554668355.155:50561): avc: denied { map } for pid=27254 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000040)="f0", 0x1) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x3, 0x4) 20:19:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) [ 1229.287634] audit: type=1400 audit(1554668355.165:50562): avc: denied { map } for pid=27254 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000000)=ANY=[@ANYBLOB="34010000170003020000000000000000fe8000000000000000000000000000aa000000000000000000000000000000000000000000000000ff01000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000e000000100"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000526fe75a87710cf81322d7946488123b9f3402dccc171ff062ec8e178f4b5df509d0bcac07758150fb9bea39ddeca58598535b714d1ea5f8dcf5d27be46189adab80c26651d822604bf78fb8ad643d"], 0x134}}, 0x0) 20:19:15 executing program 1: r0 = socket$packet(0x11, 0x100000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1}, 0x14) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) sendto$inet6(r0, &(0x7f0000000080)="050300000300000000000000c52cf7c21975e697b02f00066b2b2ff0dac8897c6b11876d886b6621d8d217cc", 0x2c, 0x4000000, 0x0, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0xa, 0x4, 0x5) setgid(r2) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000140)="f0ed6706d2f4d53da8edaa70d698ba69002033300dcd1a1b7f76e61e533b53fa794f015f22cfcbd7df3a7eec71ca") [ 1229.500840] audit: type=1400 audit(1554668355.205:50563): avc: denied { map } for pid=27254 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:15 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000000)=""/237) ioctl$TCXONC(r0, 0x80045439, 0x0) [ 1229.662079] audit: type=1400 audit(1554668355.215:50564): avc: denied { map } for pid=27254 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:15 executing program 4: socketpair$unix(0x1, 0x10000000000003, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000001c0)={0x0, r0, 0x5, 0x9, 0x100000000, 0x401}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x6685) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f0000000000)=ANY=[@ANYBLOB="44efffff0f00110c00000000000000004000000b5e16453e114fc0a313bdf48fac14ff49fa7fdfc4fcb63d8d9618f057a346cc9138865619fc702a7876d6a99e9ca86ac8b206e52b0d0d0779dfff62f2c9185e9b2667e691b84ad0b39135b57de7a2fa8668be710acaaee4407b79fd7b1c1b614d0bfd4a0dea3b3d076bd1bc3b9cc5c2be2f2b7a7a4bb795e93235346c9cd877d31fb73109815d6012e2fbc5ccd3b2e7723a251b9dfd4f50d27e7feeea5a556d9fecb749b6d81d84f56271a6e20b18ee2ea811e20c26ad7b7c2d907749ecd59de5ce04afbc09066e02b64311c39de8d24335e6b54cd5ad", @ANYRES32=0x0, @ANYBLOB="00000000000000000f001200080001007369740004000200140003006e723000"/44], 0x44}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 1229.777981] audit: type=1400 audit(1554668355.255:50565): avc: denied { map } for pid=27254 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1229.882123] audit: type=1400 audit(1554668355.275:50566): avc: denied { map } for pid=27254 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1229.934967] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 20:19:16 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x1}, 0x0, 0x400000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00005b8000/0x3000)=nil, 0x3000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) mmap(&(0x7f000060b000/0x1000)=nil, 0x1000, 0x5, 0x8000400200000033, r0, 0x0) unshare(0x0) r1 = getpid() sched_setscheduler(r1, 0x7, &(0x7f00000000c0)) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r2) rt_sigprocmask(0x2, &(0x7f0000000240)={0x6}, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@loopback}}, {{@in6=@initdev}}}, &(0x7f0000000500)=0xe8) socketpair(0x2, 0x2000000080003, 0x100, &(0x7f0000000200)) r5 = socket$inet(0x2, 0x0, 0x6251f9de) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f00000005c0)={'nat\x00'}, &(0x7f0000000540)=0x78) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x804) r6 = creat(&(0x7f0000000280)='./bus\x00', 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xd, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x2, 0x0, 0x44}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) ftruncate(r6, 0x2008200) r7 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r6, r7, &(0x7f0000d83ff8), 0x8000fffffffe) 20:19:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = inotify_init() read(r2, 0x0, 0x0) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x0, &(0x7f0000000280)="2b9397bc6ad3b12a71056c756f5fc659ee205f5bfeb09c1bbc6ae867333125c1e8d91bacf3b14f194f75fa77959a4e9ff4d76779074356af7ac1691ea31ce67e90d7d781699d20fbdd6a960428188be2f210aa8f93ea711c05459c334142b80c402311fd7d3436a62a9008bf1697c85e6cbc9aac5fb77a5ea6523dd6b3d1b430963d9d9accadae60e50ca82be224c9b8d3a1ae97b50a4ad30ca3f8edb22eed9d9f01ed9913f2400a901900853bb9819c38e100"/189, 0x0, 0x0, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000008ff8)=0x7) fcntl$setsig(r4, 0xa, 0x12) close(r5) fcntl$setownex(r4, 0xf, &(0x7f0000000180)={0x0, r3}) dup2(r1, r2) tkill(r3, 0x16) [ 1230.033527] audit: type=1400 audit(1554668355.815:50567): avc: denied { map_create } for pid=27275 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1230.169091] audit: type=1400 audit(1554668355.825:50568): avc: denied { map_read map_write } for pid=27275 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1230.309614] audit: type=1400 audit(1554668355.845:50569): avc: denied { map_create } for pid=27275 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1230.351495] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=27296 comm=syz-executor.4 20:19:16 executing program 0: perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20200, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x80102, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="06d3e4a243ca78419265474f8c3a21a13b6906575ab4b2da07") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/252, 0xfc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r2 = dup(r0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000400)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) getdents(r3, &(0x7f0000000040)=""/46, 0x2e) getrandom(&(0x7f0000000280)=""/65, 0x41, 0x1) socketpair(0x8, 0x2000000005, 0xfffffffffffffffc, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000200)}], 0x1) 20:19:16 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000000)="cdfd5f71ed9752d520061087b31213510516045c016ed3cc8edc457055979051e9366608ce0e8439d8dfb621c4c86a97d74575e24e29d2b372849f793867d091e3854535c74b1089cd8d87e9c4eb4001f7129ce1cb713321af4d04c17df03820111f341242b54635f87cd01c2650a85ec1395f1486e0aa72bf1858b804a55f8331e20749397f1222feaa7cdda2f675e1331a2764a05df43c39c9de8556ca9980b2b565822c37af55c972d8d4d4385f5c97c6c2a31c8009ed411b1dbf3a98c4a72dc21522cdc0dc97329895c54064e13a29c0c6867821") [ 1230.492334] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=27303 comm=syz-executor.4 20:19:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001140)=""/245, &(0x7f0000000080)=0xf5) dup(r1) 20:19:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0x100000073) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 20:19:17 executing program 4: socket$inet6(0xa, 0x80000, 0xffffffffffffffff) pselect6(0x32, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 20:19:17 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) getcwd(&(0x7f00000000c0)=""/57, 0x39) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) mkdir(&(0x7f0000000000)='./control\x00', 0x0) r1 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000080)={0x100, 0x80000000}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) renameat2(r1, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000240)='./control\x00', 0x5) 20:19:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x1, @mcast2, 0x7f7f}, 0x1c) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) ioctl$TCXONC(r1, 0x80045439, 0x0) 20:19:17 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000100)=0xff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x7f6, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000140)="0de12f21ba7fb619b24595b2062eba16", 0x10) clock_nanosleep(0x2, 0x1, &(0x7f0000000080), &(0x7f00000000c0)) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000180)='i', 0x374) recvmmsg(r0, &(0x7f0000000080), 0x400000000000384, 0x12001, 0x0) 20:19:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) ioctl$TIOCCONS(r1, 0x541d) 20:19:18 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x4, 0x7ab, 0x3, 0x2, 0x28f9, 0x800, 0x1f, 0x401, 0x0, 0x9, 0x4, 0x0, 0x5, 0x200, 0x1ff, 0x100000000, 0x3, 0x1f, 0xfe, 0x9, 0x100000001, 0x1, 0x9, 0x0, 0x5, 0x5}) ioctl$TCXONC(r0, 0x80045439, 0x0) ioctl$TIOCCONS(r0, 0x541d) 20:19:18 executing program 3: syz_emit_ethernet(0x75, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2, 0x600, 0x100000000000000}, @local, [], {@mpls_uc={0x8847, {[{0xe635, 0xfffffffffffffe01, 0x7f, 0x3ff}, {0x10000, 0x3a, 0x800, 0x80000001}, {0x8, 0x7, 0x7, 0xddf}, {0xfff, 0x9, 0x5, 0xbb}, {0xf4, 0xc037, 0x7, 0x3}, {0x6, 0x46dc4efd, 0xfff, 0xf01d}, {0x0, 0x8, 0x7, 0x1000}], @llc={@snap={0xab, 0xaa, "4106", "f5e3a3", 0x80f7, "c26b5461cd91537bc092bb68722e01ea228851a500d3b8d621bc18e8c58b25c13e3f26a5c84430399c0e3ed150cbd676e646bc3ff5808856e18d826aaf5eba016ac1"}}}}}}, 0x0) 20:19:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) 20:19:18 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp\x00') ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0xffffffffffffffff, 0x3, 0x9, 0x3, 0x4}, 0x100000000000081, 0x3}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x1fd) preadv(r0, &(0x7f00000017c0), 0x199, 0xff0f) 20:19:18 executing program 5: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x8) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000100)="3e5dbe82fd3681cdd7", 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0xfffffffffffffff7) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000004380)='net/rfcomm\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000004540)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000004640)=0xe8) recvfrom(r5, &(0x7f00000043c0)=""/135, 0x87, 0x40010160, &(0x7f0000004680)=@hci={0x1f, r6, 0x3}, 0x80) clock_nanosleep(0x0, 0x1, &(0x7f0000000300), 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x80000001) r7 = accept(r4, &(0x7f0000000180)=@in={0x2, 0x0, @multicast1}, &(0x7f0000001a80)=0x80) dup2(r1, r4) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$packet_int(r7, 0x107, 0x10, 0x0, 0x344) sendto$inet6(r8, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) prctl$PR_GET_PDEATHSIG(0x2, 0x0) syz_open_procfs(0x0, 0x0) fcntl$getownex(r8, 0x10, &(0x7f0000000540)={0x0, 0x0}) get_robust_list(r9, &(0x7f0000000840)=&(0x7f0000000800), &(0x7f0000000880)=0x18) sendmsg$nl_route(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c6b0c5ca4132617f1f80d33a838029504bb195afb1012d1d2ff8186dce8201e3cef54b0fdd07ddf2e7d73c4e937913e28b09e6e233466d7f701be484ab58427f8826b25692e9486c873d795"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x4) creat(&(0x7f0000000000)='./file0/file0\x00', 0x112) preadv(r1, 0x0, 0x0, 0x0) ioctl$TIOCSCTTY(r3, 0x540e, 0x81) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='ra\xab\\s\xe7', 0x0, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) chroot(&(0x7f00000008c0)='./file0/file0\x00') 20:19:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x2000000000000003, &(0x7f0000000040)=ANY=[@ANYBLOB="182000000000000000000000000000009500000000000000e304218e0d62e407702fe208c2b3e1ba3b87511b91e11aeddf96434fc8318a9d43a8b09ec517b1b93d3c7d32b6cd6a1930354536eceffa86077f9b48e51f01a1c87980b76723329d120ec0efcf2cb872e7245447c85bb893b8327442d0804eb6575f84ce05d02d7d9976d40a2853cb2c6f3d028ab5414ca3ddb04923bcc71f8f635fd37a692d6b8aa506fab1ab0e64cb5ec776cda62235f4d6eedea7dc83544a1b0aa515da0419807e8328cb0ce0961b5d535932e6863ff955b441a06980851198635080df510f55d0715db8afdc530743401c"], &(0x7f000039cff6)='syler\x00', 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x22) 20:19:18 executing program 3: clone(0x1fffffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000140)) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000300)={0x8, 0x1, 0x1, r1}) ptrace$cont(0x18, r0, 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.upper\x00') lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x7f, &(0x7f0000000340)='./file0\x00', r2, &(0x7f0000000500)="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") ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xaa}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000440)={@mcast1, 0xc, r3}) setxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) ptrace$getenv(0x4201, r0, 0x100, &(0x7f0000000180)) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000080)={0x2d4, 0x0, &(0x7f0000000040)}) 20:19:18 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x10000, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x80045439, 0x0) 20:19:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000015c0)={'sit0\x00\x00\x00\x00\xef\x00'}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x4000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@RTM_GETNSID={0x0, 0x5a, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@NETNSA_FD={0x0, 0x3, r1}, @NETNSA_NSID={0x0, 0x1, 0x1}, @NETNSA_FD={0x0, 0x3, r2}, @NETNSA_FD={0x0, 0x3, r3}]}, 0xfffffffffffffd40}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x2) r4 = accept4(r0, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000140)=0x80, 0x800) setsockopt$inet6_MRT6_DEL_MFC(r4, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e20, 0x4, @local, 0x9}, {0xa, 0x4e24, 0x5, @mcast1, 0x3ff}, 0x7, [0x9, 0x5, 0x2, 0x8, 0x4, 0x2, 0x20000, 0x100000001]}, 0x5c) 20:19:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) fsetxattr$security_evm(r1, &(0x7f0000000440)='security.evm\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1, 0x2) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00'}, 0x18) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x0) getsockopt$sock_buf(r2, 0x1, 0x3f, 0x0, &(0x7f0000000000)) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000100)={0x0, 0x0, 0x7, 0x5, 0x8, 0x8}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPIOCDISCONN(r3, 0x7439) connect(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x0, 0x3}}, 0x80) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) 20:19:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x2) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x20000840) fallocate(r0, 0x10, 0x5, 0x2) 20:19:19 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="04490d612bc364f9cd416c0f084914ab437da84384d16e049fab758b57352f3d528ab109cb419f6cf473175ce228ada97a5536894084be5007561264614d68d529595f03") ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0xa43, 0x7, 0x4, 0x81, 0x15, 0xa174, 0xfff, 0x7, 0x7, 0x2, 0x0, 0x3}) ioctl$TCXONC(r0, 0x80045439, 0x0) 20:19:19 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xc) r2 = fcntl$getown(0xffffffffffffff9c, 0x9) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200400, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000180)={[], 0x8, 0x1, 0x2, 0x1, 0x7, r2}) ptrace$cont(0x7, r0, 0x0, 0x7ff) setpgid(r2, r2) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa6}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) write(r1, &(0x7f0000000140)="c36af5741bbb5bb1f48ab8e7", 0xc) ptrace$cont(0x20, r0, 0x0, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000000, 0x13, r3, 0x0) r4 = socket$inet6(0xa, 0x5, 0x8) dup(r4) 20:19:19 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)=0xfffffffffffffff7) r1 = getegid() setgid(r1) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x6}, [{0x2, 0x1, r2}, {0x2, 0x0, r3}, {0x2, 0x7, r4}], {0x4, 0x2}, [{0x8, 0x0, r1}, {0x8, 0x4, r1}], {0x10, 0x5}, {0x20, 0x2}}, 0x4c, 0x1) r5 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000340)=r5) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000380)) wait4(r5, &(0x7f00000003c0), 0x61000003, &(0x7f0000000400)) r6 = fcntl$dupfd(r0, 0x406, r0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={0x0, r6, 0xd, 0x3}, 0x14) io_setup(0x2, &(0x7f0000000500)=0x0) io_getevents(r7, 0x6, 0x2, &(0x7f0000000540)=[{}, {}], &(0x7f0000000580)={0x77359400}) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/enforce\x00', 0x10000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r8, 0x0, 0x48a, &(0x7f0000000600)={0x20, 0xdb, 0x3}, 0xc) setns(r8, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x6685) r9 = add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r9, &(0x7f00000006c0)="3ba069d1f3c513303c57dc0d003e208cd527e526e50f194a81ca28f4c8852afc822a030b9ee9d08c4bb12f3afefd35e6521b4eba5df461e28cd61baa72d39cfb666671248afe0d23deb4ae29cd99b55f4b8bc8ec77f70d67596268da94b9f81b85afc39dc508f4513bf35a50", 0x6c) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000740)) pivot_root(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) pipe(&(0x7f0000000800)) ioctl$sock_SIOCOUTQNSD(r8, 0x894b, &(0x7f0000000840)) keyctl$instantiate_iov(0x14, r9, &(0x7f0000000ac0)=[{&(0x7f0000000880)="54917710a554", 0x6}, {&(0x7f00000008c0)="3844a8933610c374d009fe45e286a86fb92ccf6aadf9fec6483a37e2dde9ff93828f4e469ea3b02f1957e2e860a36abefa27ddbd48b176c8a401f1256fa516f71fb7e6b48fc2ea6e90114546ad3cc7af57df93c30dec7bc33c1cfb7525cf999f5f06fdea453da9c41e6858ee77542970993112b8989d2deb7ff96abf38692241e4c54ac2264594539c6d5dd283d7", 0x8e}, {&(0x7f0000000980)="b2e6ea99abf6e42d48e1665bbe727ccf6342501d860c5f264ab978e6d7d72491051bda0d0cef31e186300950ddc75c24900a4f2098a57eea3a2f0813de7ac413fccb506acb68c7fd4896df01f5523967fb8927dfb79695487b8568bad4b947d3e175a446b41d7fdc7bea36d2080ffef068b35f5c4aaab69fa5314aac", 0x7c}, {&(0x7f0000000a00)="68cb7daad5af1234f861aadc4a32b7297d6eb1d093679ab49f13803be21331f8e3a2b733c7d94c2ff01e899e77b6d2c187ec4b0a1996d5ae775da9d51567fe33b1f7a41fdc19733d95b3824bae7983ef455653d02a853eadd29ee147dcb31f2318a8ca8c1a0c3139d026c618da5fba2147364462186170d8213e5bcd1a2254d5ecc22e5a3715ee5f216a74ddad8bddb9f31d1bb7dd5e", 0x96}], 0x4, r9) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000b40)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r8, &(0x7f0000000c40)={&(0x7f0000000b00), 0xc, &(0x7f0000000c00)={&(0x7f0000000b80)={0x58, r10, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x685}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) 20:19:19 executing program 5: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='big_key\x00', 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f00000001c0)={0x2, 0x6, 0x100000000, 0x9, 0x0, 0x1d}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40008080}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x20, r2, 0x3, 0x870bd28, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}]}, 0x20}}, 0x20044054) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f00000000c0)) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 20:19:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x10, 0x0, 0x70bd2b, 0x25dfdbfe, {0xd}, [@typed={0x4, 0x31}]}, 0x18}, 0x1, 0x0, 0x0, 0x880}, 0x20000004) syz_emit_ethernet(0x7a, &(0x7f0000000200)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "81182e", 0x44, 0x2f, 0x0, @local, @local, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {}, {0xffffca88}}}}}}}, 0x0) 20:19:19 executing program 3: r0 = socket(0x4, 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x22000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r2, 0x303, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x5}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x804}, 0x840) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0x72b9248947be5fe8, 0x0}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000002c0)=0x93d7, 0x4) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r3, &(0x7f00000017c0), 0x341, 0x0) 20:19:19 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) [ 1233.954217] kauditd_printk_skb: 258 callbacks suppressed [ 1233.954225] audit: type=1400 audit(1554668360.155:50828): avc: denied { read } for pid=27407 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:19:20 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x3, 0xd9, 0xfffffffffffffffc, 0xe2a, 0x0, 0x2, 0x20000, 0xa, 0x10000, 0x4, 0x872b, 0x1, 0x200000, 0x9, 0x101, 0x100, 0x2, 0x7, 0x200000000000000, 0x5, 0x1, 0xcd, 0x3, 0x0, 0x8, 0x7, 0x7f, 0x3, 0x7, 0x5, 0xfffffffffffffff7, 0x9, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x2, 0x3f, 0x0, 0x2aa2, 0x5, @perf_config_ext={0x8029, 0x32}, 0x400, 0xb7, 0x1ff, 0x2, 0x6, 0x45, 0x5}, r1, 0xb, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) accept(r3, &(0x7f0000000240)=@isdn, &(0x7f0000000040)=0x80) getitimer(0x0, &(0x7f00000002c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xe, 0x0, &(0x7f00000000c0)="a3375f83dd2586651779c2b1dc11", 0x0, 0x3dc}, 0x28) 20:19:20 executing program 4: keyctl$join(0x1, &(0x7f0000000240)={'.yz'}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:hwclock_exec_t:s0\x00', 0x24, 0x3) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x402, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x80) [ 1234.129796] audit: type=1400 audit(1554668360.155:50829): avc: denied { map } for pid=27422 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1234.251546] audit: type=1400 audit(1554668360.155:50830): avc: denied { map } for pid=27422 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1234.442861] audit: type=1400 audit(1554668360.155:50831): avc: denied { create } for pid=27421 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:19:20 executing program 1: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) chown(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r0, r1, 0x0, 0x20000102000004) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000100)=""/111) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) chroot(0x0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000300)={0x1, &(0x7f0000000180)=[{0x7, 0x20, 0x2}]}) 20:19:20 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$update(0x2, r0, &(0x7f0000000180)="a7081127c211656207621010f320492444cb69b5edfb316e46d372d416effc93", 0x20) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000002c0)={0x8, 0x8}, 0xc) ioctl$TCXONC(r1, 0x80045439, 0x5) open(&(0x7f0000000080)='\x00', 0x41, 0x40) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x6) socket$inet(0x2, 0x800, 0x3) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000040)={'rose0\x00'}) [ 1234.663672] audit: type=1400 audit(1554668360.155:50832): avc: denied { write } for pid=27421 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1234.685300] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1234.698344] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1234.714601] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1234.746270] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1234.760306] audit: audit_lost=744 audit_rate_limit=0 audit_backlog_limit=64 20:19:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x1d, 0x4, 0x101, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x808808}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xcc, r2, 0x4, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8000}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x13ae}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3ff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x100000001}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3f}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x21}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3be8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x11}, 0xc004) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x3c9) 20:19:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x1800, &(0x7f0000000480)={[{@mode={'mode', 0x3d, 0x80000001}}, {@mode={'mode', 0x3d, 0x5}}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@obj_role={'obj_role', 0x3d, '{)^'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, r2}}, {@smackfshat={'smackfshat', 0x3d, '/dev/full\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@subj_user={'subj_user', 0x3d, 'configfs\x00'}}]}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast2, @in6}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) syz_mount_image$msdos(&(0x7f0000000580)='msdos\x00', &(0x7f00000005c0)='./file0\x00', 0x10001, 0x4, &(0x7f0000000800)=[{&(0x7f0000000600)="1853601f8047a28f002472caf04d604549c818c351f3120f555dd375974d324de8436b746d", 0x25, 0x4}, {&(0x7f0000000640)="09e4cee9f6fc0246905a3de27866c86a0b695b38e52c9179d04c95066fd9d68a0b57d2afb2385b5e02f405608941d585a5f26f4397897f66abcde5556764ddeb99674663d262d42a446b9ab6427dfa2c681a5286dd8e06a6a2942f0e24e93da17283e879327263cc6b32f253d790601932f3b25e9c9d64808bec570cafe107f5992463d7fcdd2351e6d0dbfc9bd7", 0x8e, 0x3ff}, {&(0x7f0000000700)="23d1491b8c02347f049ad1b46c1129007bbaa1533a1bf8a189006b4640658f81911544c842665bf86e8cf8767fec5c2068735e2f790d9b0115ddba56633539a73e19e20ed6aafdd6fd1bac56e2732c010e5f5f0d4fa4faac7c8a4627db2cc33e433dbfe3ed782ee979278e0ddfe794f4f066318bd58b7e3d8e38ed44cb5dc3d1cec9356ea73120d6833be1", 0x8b, 0x7c8}, {&(0x7f00000007c0)="fa4f8ff4e23ec22004628c8220a77efa6b01908b", 0x14, 0x100}], 0x60, &(0x7f0000000880)={[{@dots='dots'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'fowner'}}, {@subj_type={'subj_type', 0x3d, 'keyring'}}, {@hash='hash'}, {@dont_appraise='dont_appraise'}, {@measure='measure'}, {@smackfshat={'smackfshat'}}, {@smackfshat={'smackfshat', 0x3d, 'defcontext'}}, {@smackfsfloor={'smackfsfloor'}}]}) 20:19:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0xfffffffffffffca6, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000cd8000)=""/1, 0x2e171c03}], 0x1) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r6, 0xa, 0x12) poll(&(0x7f0000000280)=[{r7}], 0x1, 0xffffffffffbffff8) dup2(r6, r7) fcntl$setown(r7, 0x8, r5) tkill(r5, 0x16) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) 20:19:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x4a, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='gid_map\x00') preadv(r0, &(0x7f00000017c0), 0x1be, 0x0) [ 1235.760651] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1236.381036] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1236.428317] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27487 comm=syz-executor.0 [ 1236.440758] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1236.510644] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27487 comm=syz-executor.0 [ 1236.592008] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27487 comm=syz-executor.0 [ 1236.643058] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27487 comm=syz-executor.0 [ 1236.677595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27487 comm=syz-executor.0 [ 1236.707694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27487 comm=syz-executor.0 [ 1236.739056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27487 comm=syz-executor.0 [ 1236.771452] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27487 comm=syz-executor.0 [ 1236.802740] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27487 comm=syz-executor.0 [ 1236.833974] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27487 comm=syz-executor.0 [ 1237.190177] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:19:23 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}) bind$packet(r2, &(0x7f00000001c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) 20:19:23 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt6_stats\x00') ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000040)=""/29) 20:19:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="fe59c14ebda358cd11d4acf88d83d27c8d594be46d9b2a0d02247508626517910c90a3e51d1fdaa3cabb6654a1c77fbec634bd0040e08b00fe0f09b7a9128780c16b85375cb77ca0f421abb626e78e01b1aacc6f1507bd3b9dff9c166fd0b4396c19804242840be8"], 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) add_key(&(0x7f0000000140)='id_legacO\x05', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000500)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbcL7\x8b\x00', 0x3f}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000580)=0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f00000003c0)=0x8be, 0x4) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fcntl$setsig(r1, 0xa, 0x36) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0xfff, 0x100, 0x8, 0x2, 0xec9c, 0x7f, 0x0, 0x0, 0x6, 0x2, 0x8, 0x5, 0x40, 0x1, 0x3f800000000000, 0x0, 0x7, 0x3, 0x7, 0x9, 0x9, 0x3e, 0x3, 0x3, 0x100000001, 0x8, 0x3ff, 0x1, 0x0, 0x860, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0xdb4a33}, 0x1000, 0x2, 0x8, 0x4, 0x5, 0x6, 0xee}, r2, 0x5, r1, 0x9) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x7f) r3 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) socket$inet_tcp(0x2, 0x1, 0x0) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)="10ec", 0x2, r3) openat$tun(0xffffffffffffff9c, &(0x7f0000000740)='/dev/net/tun\x00', 0x200000004004, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000680)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 20:19:23 executing program 3: mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x80000, 0x10) getsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000200)=""/26, &(0x7f0000000240)=0x1a) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) wait4(0x0, 0xfffffffffffffffd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000280)="098f411f5ba4e0195b0d209d40901d6679733f6f4b09d7aad0a0eccd5f479444ab97ebd2148585c21a8f7eae469ffd3d378a8ad4d37668cf9a799bb32d15fed8164d88bf1647858ef3a5f2c947379f6b0b9b3364d4c626ee7de3d136b74905bf9b4fb93821beb24131fdfc420f5af59d") r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/14, 0x34c}], 0x1) timerfd_settime(r1, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000180)={0x51a, 0x3, 0x34b7d87, 0x901, 0x0, 0x3}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) sync_file_range(r1, 0x6, 0x8, 0x2) clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x101000, 0x100) ioctl$TCGETA(r4, 0x5405, &(0x7f0000000100)) sendmsg$key(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000300)=ANY=[@ANYBLOB="0202200313000000000000000000000005000600571866720a000068c3b29e359eed6d00200000005500000000000000000000000000000005000900df0000002a00002000000000fe8000000000000007000000000000ff00000000000000000200010000ffff000000050d0000000005000500eb0000000a00000000000000ff020000000000000000000000000000000000000000000023cfa6cebaff74da8a068286ef759d1c9d6fc92e7af6b8a50bf0b408db52a63f2e7b19cac4c6d5fad3a37102e15be69cfe1cb6b2c17484"], 0x98}}, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000510000/0x2000)=nil) io_setup(0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000080)=0x46d) 20:19:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'n\xf9\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x4}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_vs_stats_percpu\x00') inotify_add_watch(r2, &(0x7f00000001c0)='./file0\x00', 0x1000000) ioctl(r1, 0x8916, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000200)=""/117) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x908, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x800) ioctl(r1, 0x8936, &(0x7f0000000000)) 20:19:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) getsockname(r0, &(0x7f0000000100)=@ax25={{0x3, @bcast}, [@remote, @null, @bcast, @default, @default, @remote, @netrom, @rose]}, &(0x7f00000001c0)=0x80) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) connect(r1, &(0x7f0000000280)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x80) write$P9_RAUTH(r2, &(0x7f0000000180)={0x14}, 0x14) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x4e21, 0x7, @loopback, 0x7fffffff}, 0x1c) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) lsetxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'U+', 0x3f}, 0x28, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 20:19:24 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000000000}, r0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000040)=0xfa4) ioctl$TCXONC(r1, 0x80045439, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xfffffffffffffffe) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x7, 0x1, 0x81, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) 20:19:24 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 20:19:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'veth0\x00', 0x201a}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'veth0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="489592572ca0aed6de1b4bc6da12572c", 0x2b, r3}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="d214c0e12eb5e6ea076cca63e0537907"}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x28000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x2, 0xac49bcdfecad39cd) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x200000, 0x0) pipe(&(0x7f00000001c0)) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4000400201) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) [ 1238.970270] kauditd_printk_skb: 385 callbacks suppressed [ 1238.970278] audit: type=1400 audit(1554668365.175:51163): avc: denied { map } for pid=27550 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:25 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) rt_sigsuspend(&(0x7f0000000240)={0x400}, 0x8) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x62, 0x2, 0xaf, 0x2, 0x0, 0x9, 0x80004, 0x2, 0x4, 0x267, 0x9, 0x6, 0x9, 0x1, 0x3, 0x81, 0x3, 0x5, 0x0, 0x100000000, 0x100000001, 0x6, 0x7fffffff, 0x8, 0x98, 0xffff, 0x3, 0x5, 0x18000, 0x1, 0x81, 0x9, 0x1, 0x100, 0x101, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000280), 0x9}, 0x5, 0xff, 0x401, 0xf, 0x9, 0x3ff, 0x3}, r2, 0x5, 0xffffffffffffffff, 0x3) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x20, 0xa7cd, 0x1d00000000000000, 0x37f, 0x0, 0xfff, 0x8000, 0x3, 0x5, 0x2f6f8f9d, 0x4, 0x7, 0x1000, 0x80000000, 0x37, 0x2, 0x6, 0x6, 0x8, 0x9, 0x6, 0x200, 0x21, 0xbeb, 0xbc84, 0x9, 0x2, 0x400, 0xbb80, 0x100, 0x5, 0x3f, 0x3f, 0x5130e908, 0x80, 0x1, 0x0, 0xffffffffea9f4766, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x40, 0x800, 0xa25f, 0xf, 0x1847, 0x1, 0x2}, r2, 0xa, r0, 0x3) ioctl$TCXONC(r1, 0x80045439, 0x0) ppoll(&(0x7f0000000180)=[{r1, 0x40}, {r0, 0x200}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0xe7}, 0x8) r3 = dup(r1) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r4, 0xe00, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x2, @bearer=@l2={'eth', 0x3a, 'vlan0\x00'}}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x240048d1}, 0x40) 20:19:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000080)) [ 1239.127140] audit: type=1400 audit(1554668365.175:51164): avc: denied { map } for pid=27550 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1239.288109] audit: type=1400 audit(1554668365.275:51165): avc: denied { map } for pid=27559 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000540)=0xaf) [ 1239.406970] audit: type=1400 audit(1554668365.285:51166): avc: denied { map } for pid=27559 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1239.540272] audit: type=1400 audit(1554668365.295:51167): avc: denied { map } for pid=27559 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1239.666076] audit: type=1400 audit(1554668365.315:51168): avc: denied { map } for pid=27559 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1239.803351] audit: type=1400 audit(1554668365.395:51169): avc: denied { map } for pid=27559 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1239.927476] audit: type=1400 audit(1554668365.425:51170): avc: denied { map } for pid=27559 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1239.964432] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1239.979376] audit: audit_backlog=65 > audit_backlog_limit=64 20:19:27 executing program 0: r0 = socket(0x10, 0x6, 0xfffffffd) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$inet6(0xa, 0x2, 0x18000003) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x109402, 0x0) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}]}) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r3, &(0x7f0000007800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000076c0)=[{0x18, 0x29, 0x3, '\a'}], 0x18}}], 0x1, 0x0) sched_getattr(r1, &(0x7f0000000000), 0x30, 0x0) 20:19:27 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r2, 0x80045439, 0x0) ioctl$KDSKBLED(r2, 0x4b65, 0x800) 20:19:27 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffeb) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x121, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x667, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffffffffffff52a2) 20:19:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) sendfile(r0, r0, &(0x7f00000000c0)=0x3, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x30, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 20:19:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) r3 = dup(r0) ioctl$RTC_WIE_ON(r3, 0x700f) r4 = dup2(r1, r2) write$P9_RLERRORu(r4, &(0x7f0000000000)={0x17, 0x7, 0x2, {{0xa, '/dev/ptmx\x00'}, 0x20}}, 0x17) 20:19:27 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000021ff4)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000340)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1e, 0xb4ca41214fc36b2, &(0x7f0000000380)=ANY=[@ANYBLOB="850400102a00004b580000802f2b05f553f6370ced000000"], &(0x7f00000003c0)='syzkaller\x00', 0x4dfc, 0x1e, &(0x7f0000000200)=""/30, 0x0, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000000280)={0x9070, 0x7}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x1, 0x7, 0xfffffffffffffff8}, 0x10}, 0xffffffffffffff6f) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x101000, 0x0) io_setup(0x10001, &(0x7f00000001c0)=0x0) io_cancel(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x3, r3, &(0x7f0000000400)="494e80df3eae1b94ab7e0a36a2ba752478e2ed6433703fdda293560479c49256106a639d09935f891920bba4259d9ba5fd807f6ae62496552807d21b678c500523771761b7f08e4278d5", 0x4a, 0x80000000, 0x0, 0x1, r4}, &(0x7f00000004c0)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000580)={{0xffffffffffffffff, 0x0, 0x6c, 0x3, 0x1}}) 20:19:28 executing program 4: ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) pipe2$9p(0x0, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(0x0, 0x0) pwritev(r2, 0x0, 0x0, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000140)="30ffffffff00000000c528c20000003870") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r1, 0x0, 0x7, &(0x7f00000000c0)='ppp1: \x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r3, 0xffffffffffffffc9) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r4, 0x7709, 0x0) 20:19:28 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0xfb) 20:19:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x14e, &(0x7f00000001c0)={&(0x7f00000000c0)=@getrule={0x14, 0x22, 0x401}, 0x24d}}, 0x0) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@getspdinfo={0x24, 0x25, 0x325ccc5d8db3cc09, 0x0, 0x0, 0x0, [@replay_val={0x10, 0xa, {0x70bd25, 0x70bd28}}]}, 0x24}, 0x8}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 20:19:28 executing program 0: openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x2, 0x768, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x20001000000003, 0x0) write(r0, &(0x7f0000000000)="220000001400070500e80000004c03000208030001000000080002004102fff0f054", 0x22) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000080)=""/215) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='.request_key_auth\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300), 0x0, 0xfffffffffffffffe) request_key(0x0, 0x0, &(0x7f0000000400)='keyring\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000440)='.request_key_auth\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) [ 1242.456456] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:19:28 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x0, &(0x7f0000000200)=ANY=[], 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x100, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f00000007c0)={'team0\x00', 0x43}) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000800)={'bond0\x00', 0x3}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x6000, 0xc, &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000580)=0xc) clock_getres(0x4, &(0x7f0000000240)) getpeername(r3, &(0x7f00000003c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x80) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f0000000100)={0x8a58, 0x4, 0x101, 0x1, 0xffffffff, 0x101}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000380)=0x1) ptrace$getregs(0xe, r2, 0x6, 0x0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000200)=""/35) syz_genetlink_get_family_id$SEG6(&(0x7f00000004c0)='SEG6\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x10) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) clock_nanosleep(0x0, 0x1, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x806, 0x0) ioctl(r4, 0xc1, 0x0) io_setup(0x10000000000005, &(0x7f0000000300)=0x0) io_getevents(r5, 0x8, 0x34e, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x1c9c380}) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4001800}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB="f31508f3", @ANYRES16=r6, @ANYBLOB="010025bd7000fddbdf25030000000800040009000000080004000101000008000400060000002800010008000800070000000c0006006c626c630000000008000b0073697000080004004e200000"], 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x10) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000840)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) 20:19:28 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) rt_sigreturn() ioctl$TCXONC(r0, 0x80045439, 0x0) [ 1242.570817] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1242.694630] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. 20:19:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") stat(0x0, 0x0) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x100000c) ptrace$cont(0x18, r1, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 20:19:28 executing program 3: syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x320, &(0x7f0000000400)=ANY=[], 0xffffffc9}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2081, 0x0) preadv(r0, &(0x7f00000000c0), 0x0, 0x10000000000) 20:19:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) fsync(r2) ioctl$int_in(r1, 0x5452, &(0x7f0000000580)=0xe2e) fsetxattr$trusted_overlay_nlink(r0, 0x0, 0x0, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0x10) ptrace$setregset(0x4205, 0x0, 0x3, &(0x7f0000000380)={&(0x7f0000000680)='*', 0x1}) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000280)) pread64(r2, &(0x7f00000006c0)=""/228, 0xe4, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x401, 0xffffffffffffffff, 0x0}, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000500)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @multicast1}, {0x6}, 0x10, {0x2, 0x4e24, @rand_addr=0x800}, 'bond_slave_0\x00'}) bind$inet6(r1, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x4, @loopback}, 0x1c) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f00000004c0), 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f00000002c0)=0xc) get_robust_list(r4, &(0x7f0000000200)=&(0x7f00000001c0), &(0x7f0000000240)=0x18) ftruncate(r3, 0x2007ffc) 20:19:29 executing program 4: gettid() setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x900, 0xce57e85f1cf6f2c4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'bond0\x00', &(0x7f0000000200)=@ethtool_stats={0x1d, 0x1, [0xffffffffffffffff]}}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 20:19:29 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6c, 0xfffffffffffffffe, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x40000000000000, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) r1 = dup2(r0, r0) r2 = fcntl$getown(r0, 0x9) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000023c0)={'mangle\x00'}, &(0x7f0000002440)=0x54) sendmsg$nl_generic(r1, &(0x7f0000002380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8020}, 0xc, &(0x7f0000002340)={&(0x7f0000000080)={0x22bc, 0x20, 0x0, 0x70bd2c, 0x25dfdbff, {0x2}, [@generic="ac6c320340ca0808f5e28d589b0affa1ba641c98d7ee230248c0e93b558be47f9e45cc4e94b70ffc9805da473dcdd436e58f74a55690fbfee4040e275e2603acc586781ddcf3dcbab6e427c34ee74a0d879d403e4ecb3ec91c648b635e149a19a52fcfe20ec4108c24cb1552b447f2763c747d7ec885f3f2cc7e50cbaf99001afd453a35739b9c3089e66e9a34b0ffb935e540823c1050e9498471a5352dad7515324c4a0dfb9bdaa80f3133fa4fafc81108eae20b6cac635e71e6e03b6448dd81c2b444f3d863078db6e9d27c33478314e8922ad5ffa7a1d7b160cbfabbe3060e86062205cbb6fcaa77c2d9950a5012d679e4ec83e898", @nested={0x1c, 0x5f, [@typed={0x10, 0x31, @str='/dev/ptmx\x00'}, @typed={0x8, 0x55, @ipv4=@loopback}]}, @nested={0x202c, 0x8e, [@typed={0x8, 0x94, @pid=r2}, @generic="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", @typed={0xc, 0x7, @u64=0x2}, @typed={0x8, 0x2d, @ipv4=@multicast1}, @generic="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", @generic="0f7c4ce32c7f509fa8838d"]}, @typed={0x8, 0x9, @u32=0x8001}, @typed={0xc, 0x55, @u64=0x4}, @generic="813dda58c8cfd50b0988c924ebb9fa561459c77ace1503aab1bcec73f77b659dd89219cb60abf2c7e57cec0534f06a6e8990daef834aeb1b05206fa70c5b68a19994664274243ee824936d0b74565337fd48ef8f24f67ab391e008bb169c84a552abfc9f78ea95e158082a96a39ab659ca10b9e662", @nested={0xd8, 0x14, [@typed={0xd4, 0x61, @binary="48848f3e85e83d4797f93680aaedad03e4c2ff5555f721561091a781d0e6b710c336d8952bccae4481840a4564c42319cc720c2ad97e22dfde04b9d43949dd6d57b4d4c1e31c0d5b710d41638270e48dc905dc15d378c404a4ee148233143baa1fee8cf17dfa625513674df8d05d85d93d4036f6435337d1459accbcef42a1e1b6661177f085b7fe81714c2d065d5441659eab12ffaa218088262027c08b5b88fb9d3195c4a6f2ab2422bf5ae9f4d5b2dc8e5cbd4c1eb2baae32ff88b9be67b7fb6a2a904a5eace46fdffd2080e1e6"}]}, @typed={0x8, 0x89, @u32=0x7fffffff}]}, 0x22bc}, 0x1, 0x0, 0x0, 0x4}, 0x40) ioctl$VT_DISALLOCATE(r0, 0x5608) 20:19:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/175) setrlimit(0x9, &(0x7f0000000000)={0x3, 0xfffffffffffffffd}) recvmmsg(r0, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10001, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 1243.982250] kauditd_printk_skb: 267 callbacks suppressed [ 1243.982259] audit: type=1400 audit(1554668370.185:51408): avc: denied { create } for pid=27651 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:19:30 executing program 1: mkdir(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0xffffffffffffffff) r0 = open(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xda61b1833a4ddbb5, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x4) timer_create(0x3, &(0x7f0000000080)={0x0, 0x1f, 0x2}, &(0x7f00000000c0)=0x0) timer_delete(r1) 20:19:30 executing program 5: socketpair$unix(0x1, 0x20800000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x2c) getsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000080), &(0x7f0000000100)=0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x7, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000180)='GPL\x00', 0x80000001, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) 20:19:30 executing program 0: clone(0x7ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter6\x00') write$P9_RREADLINK(r0, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000940)='clear_refs\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000100)=@random={'osx.', 'net/mcfilter6\x00'}, &(0x7f0000000140)='bdev-\'%selfproc\x00', 0x10, 0x1) pwritev(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)="34d6", 0x2}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) chmod(&(0x7f0000000000)='./file0\x00', 0x40) keyctl$session_to_parent(0x12) [ 1244.240176] ip6_tunnel: l0 xmit: Local address not yet configured! 20:19:30 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x4c, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfbc}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x814}, 0x48d1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x3, 0x0) ioctl$TCXONC(r2, 0x80045439, 0x0) [ 1244.348393] audit: type=1400 audit(1554668370.205:51409): avc: denied { map } for pid=27675 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1244.370196] ip6_tunnel: l0 xmit: Local address not yet configured! [ 1244.391769] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1244.393082] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1244.397570] audit: audit_lost=775 audit_rate_limit=0 audit_backlog_limit=64 [ 1244.410769] ip6_tunnel: l0 xmit: Local address not yet configured! [ 1244.431613] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1244.437418] audit: audit_lost=776 audit_rate_limit=0 audit_backlog_limit=64 [ 1244.453018] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1244.458821] audit: audit_lost=777 audit_rate_limit=0 audit_backlog_limit=64 [ 1244.469582] audit: audit_backlog=65 > audit_backlog_limit=64 20:19:30 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x8000000000000a6, 0x4}, 0x1b) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000100)="ae82c2060a8d74e964eb104558f154d682a6f5c7204b76fb889645bdb779ad08a1864c7ac7f97c997c1c2995d61ca7534e26c298f354c36a7d7de5950a4262071c080103784f38cae1cf9dfa084130a671358a4c963a575bbc3592f192a4e96024d7020a69bbf6305d11b5f643da1effcd62779bd46465d65d28c5afd998b69df5903818b6917d0a43831382927a2e572f9e1961d01d3331f3ac") r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xd, 0xc, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r2, &(0x7f0000000040)}, 0x10) bind(r1, &(0x7f00000001c0)=@sco={0x1f, {0x5, 0x0, 0xa187, 0x0, 0xc990000000000000, 0x9}}, 0x80) 20:19:30 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x1, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x101240, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="9bf32b041184d9f3000000025f000001e00000c04edd8f6622063d582bc841671241753a082b6d00"/50], 0x1) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) ftruncate(0xffffffffffffffff, 0x2) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0xfffffffffffffc53) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f00000000c0)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000100)=0x4000000, 0x4) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000140), 0x4) ioctl$FICLONE(r2, 0x40049409, r0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000200)=""/95, &(0x7f0000000040)=0x5f) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r2, &(0x7f0000000380)="9ed2522e14f362bf902d23e4df140965318b12e275ba1810f50d34936b34d4df0900000000000000da7e17a5aba55bbee45408ef238c1ec0b8e134c1b6ea441a8a315473a8dbff", 0x47, 0x200408d5, 0x0, 0x0) 20:19:31 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0xc00, 0x10) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000140)="d9c1e66ea9b54519366f2a78559760297d3ccf715bbe3ca36f3a5d6841ad93c98c4ddd1fdb7d8c6037c561f45b9aafd14326a4bfce1a1b066625e96e0fae3c1d49909f34afedd61d6f61680b03cecad9e07f1fb8e4941ba0831a3ee811d33e063795e932016833b9") mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x80) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) 20:19:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000180)={'ipvs\x00'}, &(0x7f00000001c0)=0x1e) gettid() r2 = gettid() r3 = syz_open_procfs(r2, &(0x7f0000000140)='comm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000200)={'ip6_vti0\x00', 0x8}) sendfile(r4, r3, 0x0, 0xe0) getsockname$unix(r3, &(0x7f0000000000), &(0x7f0000000080)=0x6e) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000240)={0x80, 0x0, 0x1}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f00000000c0)={0x4}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x180, r5, 0x4ac0d3b16aa8a1ea, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x34}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4449}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x80, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10000}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x93}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x40}, 0x1) 20:19:31 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x8000000000000a6, 0x4}, 0x1b) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000100)="ae82c2060a8d74e964eb104558f154d682a6f5c7204b76fb889645bdb779ad08a1864c7ac7f97c997c1c2995d61ca7534e26c298f354c36a7d7de5950a4262071c080103784f38cae1cf9dfa084130a671358a4c963a575bbc3592f192a4e96024d7020a69bbf6305d11b5f643da1effcd62779bd46465d65d28c5afd998b69df5903818b6917d0a43831382927a2e572f9e1961d01d3331f3ac") r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xd, 0xc, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r2, &(0x7f0000000040)}, 0x10) bind(r1, &(0x7f00000001c0)=@sco={0x1f, {0x5, 0x0, 0xa187, 0x0, 0xc990000000000000, 0x9}}, 0x80) 20:19:31 executing program 0: iopl(0x7) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0xffffffffffffffff) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0xc010, r0, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") tkill(r1, 0x3b) wait4(0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x1) 20:19:31 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x80045439, 0x0) 20:19:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x1000) r2 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) getpeername(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000100)=0x80) sendfile(r1, r2, 0x0, 0x30008) r3 = open(&(0x7f0000000000)='./bus\x00', 0x140042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) write$binfmt_aout(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1001) madvise(&(0x7f0000004000/0x1000)=nil, 0x1000, 0xa) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 20:19:31 executing program 4: socket$unix(0x1, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) timerfd_create(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) chmod(0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, 0x0, 0x0) lstat(0x0, 0x0) capset(0x0, 0x0) open(0x0, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) socket$unix(0x1, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) [ 1245.743010] EXT4-fs warning (device sda1): ext4_resize_begin:45: There are errors in the filesystem, so online resizing is not allowed 20:19:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x9) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240), 0x4) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) splice(r0, &(0x7f0000000100), r1, &(0x7f0000000140), 0x8e2, 0x8) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) setreuid(0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xf8d) setpgid(0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x2f, &(0x7f00000001c0)={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @loopback}, 0xc) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = getpgid(0x0) ptrace$setopts(0x4206, r2, 0x1ff, 0x50) 20:19:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x101001, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000040)=""/11) ioctl$TCXONC(r0, 0x80045439, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$tun(r1, &(0x7f00000014c0)=ANY=[@ANYBLOB="00004305470a11bd006607ff016e9078ffffffffe0000002831f00ac1414aae0000002ac1414aa7f000001e00000017f00000100000008940608dd113f00071b0900004025ac1e010100000000ac1414aaac1e0001ac1414aa8307057f0000010c20880b0087000000050200a00294d7aeb9d38ea9d1f155f42e4d60f08556c37f831dd06fb13dc0064377d570922376b9c662d148ab48b962dc86a54292bc917690a885c13ed4b4dfbcc21cb29ea261f9a2c33736b761be615b0bf5ad2a4bcd500d4100fc093fa79b6716fb8a616ef634525751a6c915bf6da70b0328463515261c27229bca624b84750d04aa52f2f91f9057080008000002f22dd6940faff826441602664342df23bf2088181786b6393628856af71fe863fdd0f027e2ce99444337773412079dfc737a0e585efa7a7c19c54bdf45285cd83658ac62d682f2bdbeb43dd49519e3b50b2159d1b0046bb4adc60d4d72f4ae090086dd819cb30a6715362e2417dc5ec7d9a042e9f7abfd5222abe9e1eec919462b94ccc00bd6a157221d68bf275d1aa84f02984eb8f76adacc0b87e1b51392237bd31cf5a760c668791c303a82c95ec92067e4e0c90e0ba97a79b86a940aeea493e456fb46cc141c08360a188bf81a19403ae07f8687b69a12bf7e658541e53769052a942eabdfd6893c50418603ad952fc1e42cf8f3c80d203020f2d60cd729c83f81eb62a4511c88e3d815403a2e6454915c324a07fb9a8a4727d8a9216d48d4d31d9e685b1667a6fb733388a95b7cea446f2012121f4b48b4054dd7d93396a2bf270128cf7f4e17cb0bf8a968a8dfc9ec415748ee33e7ee027e42b2ea9e98d714e9fe02492a1ea59b3e1bfb0e3799480c548d96325c92cf7720a7b921317aad1ac5879eb9410f1e12b018cd568a0b18d86d76f9ea286a88fd6eb32d63992a1ac37d67f4a3603354114b0d852eb117bfbaa5bda8604c2bdc192bb67870d882c4152508cdb50d2ee664b37fc37b677ec05bd3f771f617303c5b50943345410302ea08a78b8ed06f170c409d0ea2e10ea342590db27c0635c80a2a70c78e3e23d3b42aae3b02172d05af324fd61c6f9a8b8c57b70189c1793e23ae3a60c5b03b68ffe34e2c6a98522c1ba9c31e8f0ed0132c14a7fb436bd879a0dc09498b094ea9c1d87ed00a3964624a1b4890b6fdf3b62ad83f87df09b6769c36031792cba5b0ba132325e233771f6636914a50e61113e56d47f87dc643e4f07a844458e66ef2f46e2a0f89ef1a470c4bb5c19cd63c9b07eb768c096defd52c60230c7c546f705de1c01a3f0cd34fc279c019afd3411fcd2dff04a8aec8488a406f24628c79f15ffc8fb5535d9f4e87020da542891eae9794e91fa356645103cd733e4553dd5fa6209610cec2f321af6961f1fc47e3314946d8657ed506fd4feb5439e9333c7b20d801ab2f0a2639d6c088b0b042c39404d27de3b7b70a25f4081634363cba4adace3788dac56cd73d883f5b8bfea213c0a1abe7a56e29787dd7496fdb686bea49213ca4ffd51140a0ef0b78f9a9c1cedf56633216e905a643a6be42cc9c61cb111e3e600438163be3d9fb91994fb1773e45f61f360cec5e2b207cbebe463fe0b2b798bae43184d6a20fe46d3f5823022da0d4d1b26115813d2ed538cf4c59228ff53278fcc30814450b5884bbe1240a8bb45b1d5bb1b42aaf4e27fad6ce052babb748ab5608cb30482fc7546387a63c7e5cfbd58545ec93c211e62c166f2fbb2ed6bc3738731e32a361b37577021b9ac9312caee9aa44fbf8d7d3eaee6bfb1094e371f229fc3dfba1b01ea84b3440c2a9d2efc165d5c8ce9923ec65c9dbf83b05dd5541f8ddbfd8db0237fc98eabb7dc6424df7e4adbcddce54b87cb7db92d65901a5add1ad16b4064e47617b1c06798d2b30e0e659e2c3bda624d4832319885c1e7936e6419740a85bd4c3f2feec37e780b8c9ec5cef17c4a5523ab5478a123dee815f1f1a5b18c9c473a9d968095d70c188ace7f9d980190de85d0d1b616d8e36ee7e928be0e68b76923783eb95e9d98ce8e9a3d50290f44ec1cf21f1e53b9c565a0cd76fd5da0ce2c546600d5f4f7b91c85c91c450c4ad0f72ab44dd0beb9464cbeecaf46ffb1cb22c2d396224f0580513583e24e9ab3c105089a1d82528171ea09c0cca6b5f3a05ab22ac672c14c0682591bf56fb42a34f7867338ca46524364be02062647d22f7c23beccce99e7e8ffc03d98dc6df7c31678800665e619d5c521bbad7cf6c473046b5c49a0ddc1c31672482d8aa65a05a873095b89727528fd75fea0d93b9844656d51646b81e5bd90130eef1668c49bf8f0bffac49c6061f09b08f59342c9f0400dd39585a4ab4e8d626cd4892d8f012334e114452537eac658882f93a796f2586e107ceea41c4f16905679831248d4ab95fd4e4b6a60818eded21b910e669f0e05a1ed369238193769018c4ce01fb89a1848ca0ed1207144cad8d159bf2d3927cb10468e0398b68367d50e075ac2af2eafb7a9385b4e68a7d0f1c46392fb695950c6ac5e3b1dc733bfc4ec1f51aad620081f1b193d7cb08147b9a8b8744716aa3dceed9c822c2200cd0260df5278e0924d9aa1c8817743ac63477f8c06a402fa7df8b1b012893ca0b3bc6fed2c8441a1a3521bfaba2bf8e249020c0d44c16bf02d364d57b41f942503d34b3dc2ddc70ab20b00f82bdfbb11bfa0dadc9418f80bb28f6bb2a0f085317ed414b3703815880b8b9cb2eb44c5a95a8d4e4fd98263774af6b18bee07eaf8c4ce165bdf72094f909052057465f3d285046ffd9da7f610eac5ec01c9e27c1e1da4a11d0d58bbb2a95a1a8e5a61202f396ab73dd97c66e327aec96fd5dd48fc033a76795b400bbf089cc66d66e7079e6c80930c60123bc2a6de6107d5e40ce7421e51fd72d7e7864b7fe50018008367f136b249c01fd73a8618e50010e699464a540ea4f3453e316e8b9f9c55c878d0fd7c4950812d9ba375d3bcf0ce01c8793045961a3fd7a91b848b8b044184633671706315d0dceef3dc69d4dd36b0be420e4e71c02779b8e26365f093ba0784423709f9930ff249fac97ed9aad004df7b4f587d48c4673f609bc8e541dc86c5b6fd1c511b87e33c80e4452c7a84be5b37e18807f499ef2ae670967033f116f550f775a751e413d77691050bd3eb320616e1642ac8c22990f6d0e58a78722bd315570337e3d70d98c9963edfcf2998ee829c1df3d4ccdaaf9bd44bf3fe97c0a3a17422de1e105da869df758b6a89a60d97e4e613b55534cdc1cfe529cb786762ebc96daf506401d5ed2828a677483137fc797d73a26978a9ef735017c630822b541f2badbdd23c7d0951a519a3350c4bd0b5fb73a423304c4b6b1f1c083f36b9a97af4b93905992109d230e9b62208b822fb5d9fb4b0b6fce712e7830259e741f60bb6f6e6073e23f6b140f272bfdc08415497e94c0bf08497856b375b1223b132c2bed473ecd751bd694d8907db092779736d097d9fc984dfd2f03fe6967d90a439fd855cb5f5df582ccdfe3453853c092432b37a3fbb2e8971a1fd27b3a643c5b7bc40cee1ba2553763c983b79076d51f96bc6a81bfc95a44522f1cb03ef42490fda5dcd673051fa8285c7d20672b9787f9a7ead8019ad390a218b0fd07d8892ac54d3a15d4b55a887abf6e3adf48580806a7aacb92fc48f4742a6f0e86850615730bb4d2ec05bd18e4cbfeda3897e3e9e8595090dddfb75a61812709a3caab8614907e3b65ef2e319cc26f1ec4c1e0bb7ccf22c00ed1f6c79b73101b6a570b959bda75fd497e1830007f7a3e8e33d8c4a0a5bfa3b457f927240ed484b38ad05bdadf87a69a793fa6b325c056cea9cf18868d9045b95e2d648e451ca8c3e3f98f9e672da5a8ecd5149a7dd76a744bfaee2abbdacd67ee832ce1d51a83bd7d773131dd5b36c89a5e8085b4cdd2c8321831e25051526212a311c6b8e74b23ebe5a6e4a875e8b487d79e9719d76796f1723c117cee7bc9226d28102b9c8f90bd3a0fe16ec62b157803e3e06057631e6946a06c71da5cafe42369e1224690f8109dc93c84e51ba41e96ace1711d099c6eaec7f4b058827ce5c201d824b47be572af2516c93a556a647caeb21829c26a7d48f9e750e5d287420c2d843979f695f27d769572d563de6da4795103e7932fe91fa36cd5000c87e7754d317ce382614474ca7f7c83e26a84ec1379bf41254870962f131421baab5e30f19874a9b3c269407f64191dead7c9fb505229a73c344512af689ab33915775e048dcaa376de94acb55d991b4eafa659983b090118444292c0afc69e1a3f1113b533fb66ef0edc5e441f2a8f1ec77de840e9573597dd9b831c767c817281028507a296833f41a035111566484ed8bfa43908f370d5e2504f7e3a1811c1defe101e03b2db91c85bc4c2657960f5ff041c863264dad607cd2f3486a606a4e4fe63e8dcfe225bfdc1ffac6dd187cb879c8deb5e55441ca67cf9a8cd00a23bef3ef51fc76316319bf3a70d472266b988e2ca86ecf274583eedfb831d403d6760276119a4c1116d1936fe92ae21a7ec1245005a1930571b1a442d5d24d00c61c221de4e95a1c8e5eff3f7aabf914f87aad990ccb308936d75a324bd4e87da2cbcce9197c4834511943fdaad8ade97fcb72ea75e84070931a9b7594d5b1d3cd0a6a8ce7ea7108db4a3149e6c9f366c38947eb8c6dbf4513599ddf5e4d1b06f487cf5e2778505fff87ad72a2183a4212a5f571620857a00f88b3b8e60ccef33af3d5ceb850f23762e52f2df0000964fd95c3d7e95d3d185a4c3e08da713b6cbc308ab15e23e19affdc2ed7414dcfb8fba2cbb9dfa02b465b84d70fe10295c4c50edf5c49e17fae4d5d9e18cdb17932cb8b4f322d67f1ec6349ae194147f217f159eab4baca933836c69dbb73708035ce286f6d3438ac1caaedcc8fdf24207a324d2d546d87eceab3c8dc96a43275e2677c63fd09167be63326238eddffba464d7cab60614062dfe2860f319ba2f23ebb9996147e39bab1774fab3e247838aea1fe42d7bd9db67890dc37d38d8c9de00a75593bc473de936d6253944b181c1f01797c470503a84a8149ed95c59feef9b4712784655a02d42343e8d8793bb37dd37a1bd5ba3eb28f1df8c37f1ecf9e83ee35597f4278f113bba71e51a3148f9b08eea6ff2b2903ac194812225acd2a2d59341f1ece2c6a2731ea441a146818428787efbfe3973b18d994609eb905e6d10bcb2c3409186f3a6598381137771aa240f912fcd9187cfc725295fc6f329550ab6c51225885baf8f905ea4f98ee0177e19ba317e10830a8b3a99103dde0ea740e1e9dfb041ac1dc86fdb746bc4c9d22bc060c0a52ec3ea52b987723744c99a16b5bb5e97f47defff260a463401615eecb9953df3077a863c165b7737fb6d8b4be0fa7aeba4ac1930aaf94591682b77fd64e487950a3282a4afa37ba6a8d640c2c933e151e806ce25c91de40343d0499bf128912458cdf11db7c397aae0d91b5815a3100ad8e63fd673193b117152349565481ce0aaf45a9a97e5844c0936b9e48c24159c371cc6dfcf0f52ba68b532450da336cda7e26f5a717607f75c42ea518923687204396c2b65c3678d90b288cc68d3d248ba917e7ee1e7e34e03ab21e881fa173ff007b62221a7abba5c4202b248355ae5f70eff736f1d06b7af59a4202a2e9d7098c081cc78aeaded386dc9d4fc7ee4e264a6656b386deb9ec7101ac02185fed79f1398c433456289cb70824e09d791deb5bbb28ae0ba1fc6558076fc970441e6268be7ef18cd927f3a574f1142b43e05ad6f5bf5f8a8ec88980c4f49d2abbc0663b66f106e19e7a304cf4e060199c549104c39315db6fcdfa8a7a81351f83c985157765111d17ec6cecb92b5b95d86abb6ef5a3a895660be9c5c7218c2e121f747345fd0b919be4e2b09dd0e77486b53856ef2ec1813c1d37b59cdc90a7df371514ff70e33cdcf05e6f889fdcacf78099f466eaab9ec5723c46ee9298ac476bd70ac710bb6d3d4dd36418e777f7521a7502cc127083bd8f3b40dd1ed213ae7eb1fb8a2819595c9d85984ede511162dd7e4494e1a1381993d4ba67e8686bfbf7568584cbeeeba81620c56b2217b38131cfd1a39654a42e985b3ada66dff8fb7c983526a31162189280b708ee29831fb21657fb2ca37cad06d13b0526b3810aa9350eac94e082897e0512b6d9ee503c26031bac6004b5f3ca3ebfe40079461a98feb4412d7930dad88097a345a1673b0080088be00000000161b1f010100000000000006080022eb000000012f05e504020000000000000010007c0008006558000000025ab6246a8f43961692fc659a4d6999b5d3c46e6e01f42939d9ba5fef3c63074a8d2abe543a1b12ebfd8ed0361544de57b7eedb543ee776798a2c195c69407eb7042b66ea7612cff9c7acda3f0744d2846b5928ee3af69ab2c418ac1f577fd6395d2c82b850dae299d947285ad8c5367272cd4007a2aba19386f17305dcbfac35957e815191477a71b709fc288590404a18a63724b29a25e810c531949deb56129bff22af884be7f1fe000000000000000000000000000002776aa3f5fe565a21adccba6f5029c896e7f4309e41ec2b1e6461061110697461eb5cdd3e546f546c2172d7242ab91e1b4cf6967daae838cb60d82001cf7b4f1d3e1828010bd96f774dc1bc73b1cc0910ad7e47bbf5e93ce043e51b50d4e6b095276ab5667b8d6dedc0d17d9485c0d0a9ea0f4907c0d2a31a28ebc271277a8645641b76352d72c269abecf2c2955e"], 0x11c1) close(r0) 20:19:32 executing program 3: r0 = dup(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000001b2f54e1000200e157b91e00ffff0000acd2ef7e2f9467bd848d0237bf6c259052861c6c0e6f6e073c68844c08fae608c98e5426e825bdadafa195114675e7e402de0f0848cdba7d9f6157a6398b29b2e65a35b11c89d31069e7bf99ee"], &(0x7f0000f6bffb)='GPL\x00', 0x7, 0xfffffffffffffe93, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3fb5}, 0x10}, 0x70) fcntl$getown(r0, 0x9) 20:19:32 executing program 5: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006008, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-'}, 0x28, 0x1) r2 = getpgid(0xffffffffffffffff) get_robust_list(r2, &(0x7f0000000340)=&(0x7f0000000300)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)}}, &(0x7f0000000380)=0x18) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x1e) ptrace$cont(0x1f, r4, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$cont(0x7, r4, 0x0, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000240)) 20:19:32 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) ptrace$getregset(0x4204, r0, 0x207, &(0x7f0000000100)={&(0x7f00000000c0)}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x527200, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)={{0x107, 0xffffffff, 0x10001, 0x300, 0x2ba, 0x2, 0x8d, 0x5}, "cbea7eee9ecf9cf661283ccc02b70426151ecd8913f5f6ed9561bb78c74eef3388361cc1a5cd419821f9529c58e3eaa30a1161b99c2cc3d0e2cf21a31c6668d5823f4b4c6cc5f59751516efd26130ba1a4cc0a85478a3ff2d360e77d58237c10fb661407e696a6fa6c79a1180fbb82e122030dc57956dc07558836f89b1e766d1bad53826c8ae584407829", [[], [], [], [], []]}, 0x5ab) pipe(&(0x7f0000000180)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000200)={0x400, 0x80000001, 0x10001}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x80000000004001fe) r4 = socket$inet_udp(0x2, 0x2, 0x0) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)=0x0) getgroups(0x4, &(0x7f00000008c0)=[0x0, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) fchown(r3, r5, r6) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PPPIOCGDEBUG(r7, 0x80047441, &(0x7f0000000040)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) close(r4) [ 1246.550196] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:19:32 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040), 0x4) ioctl$TCXONC(r0, 0x80045439, 0x0) 20:19:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='schedstat\x00') ioctl$BLKTRACESTART(r1, 0x1274, 0x0) preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000080)=""/76, 0xff0d}], 0x1, 0x0) 20:19:33 executing program 5: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r1) r2 = socket(0x200000000000011, 0x803, 0x0) getpeername$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000d40)={'ip6tnl0\x00', r3}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20091}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x104, r5, 0x22, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9d}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2e5}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x25}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x200}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40}, 0x8000) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) io_setup(0x9, &(0x7f0000000000)=0x0) io_submit(r6, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x3000000, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0}]) 20:19:33 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1d) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r2, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7ac7e319}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80000000}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x800) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x410100, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x48) 20:19:33 executing program 4: pipe(&(0x7f0000000140)) 20:19:33 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) pwritev(r0, &(0x7f00000016c0)=[{&(0x7f0000000080)="d35a55baf50b03d96c9a2e0a275b512ddfda894ea0e01d05e70be71ebe6a4cff8ddc384f13407d34956b669d6c5e95f042209070a6221840b2363174836dbd49f9738ddb32fb65cc02230c5020ca850f82612d42bae5d4aab55bee1cd1d82abcf36a72c30558cb43b77065752c008d7d07e15044d4387f3ec83740bf185616d72248007418ec383c927a7167237c7467e8b7d6a5e7b029c1f87510f365333fb35fc1d252ccb4b878633c82efa2fa1ee0daaf812b5b66761897fc2d3e464e53a9251593c9862036b5f85889d0bb3a8a", 0xcf}, {&(0x7f00000001c0)="64c78c4cfe900db43f8584631386b3e1feeaa3902bdb72bc438b25c51b1be8e8b524663566473c54080bf5e31fba6968124db3cb932b48c22f73cb14", 0x3c}, {&(0x7f0000000280)="3807d7302835c7d2edc5c483e87f45552e8258870067581f34420479005243b01e30e475f3bef2107351ea48caf156b25bd7eb140686c2df9853b0d6f6d9d6f1209f0c912f48247c80", 0x49}, {&(0x7f0000000300)="ecb503fd2030ca391c0d1176b813f343e6f6f745075f69b19bb986bb7ebe54a8b537aa3facae92ddf532d1da211a2b6223677790bf74c444fbbb5ae0afe1d93da6bbc0b3557dcb3c390298bf1f891c9409ff4939a74c1144a0159ff6bc60fe009d6133e7c0452826c8df1831a7b8b0206951616e9f6b70d1dca96cae9376ff3dd7e8dea884c7494ccdc5270ee7e7d6364fe20535de396d44045730510398c7d70083c921cde8d5d2b3aff99d070156e28f20a2b5a9fcec11ec5670f3d50e91f437882761dd54ec72ec666e785bdd18ac39e61f8191caafbcd5e583d1", 0xdc}, {&(0x7f0000000400)="52014458adfce3ec6a5eb9ab10a29751a56353fc6c0bd6b7c3f5355cc83cbb149f72c6ad3046da94189509b4beab8a118c2d1a95de866fd1aa5621f51d5dd6d15d8fe683d47e5673aa2fcf4ef1221b2ab23da579cacf1c55b4f635e4080c969e99206c61eb1d9aa7bfa9c7be7eec0002a4c2b53e21e19737b011e3b7f4ad3b5af4bfc5f2b3ac6a516910e3cc0f5b328dff8d1b681537051a61a506a84f7266d106364074a96f13845c0a183be71ffb9a7bb23ed0957e2aaefa768ebe9d1fdb4c09750342c607300622fd7cba6dd3f23bc1f6e05d78a3f9443b49cb47f6ca4647a4353946b84873830d47", 0xea}, {&(0x7f0000000500)="7ca6c9cb7f5da164c5a5e139717c7422b8e1617cbfc099017f7c6e40e7b0583f15a8f9b06d1c2d4162204922d0a5f50018ad8c34c41dbc657f59898256217d1ff7af8728b63c0fe5371e0bbc4e5ddba1836f0efa0b736fc360dff7d111ae41295f6150d2b0d396a20463cc666921e0c2430d64f5a49458d5a1bb315b3bb9157d5cbd6c9473f65e818a2a2bd607cd443e681dddef5ac6b35f52abd053bd235a6f07a07f41ebb70bfa13151bed23969f4aceafdb4237385a14c3cae2109376e1c96a9dc8f46eaed134", 0xc8}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="c47359643a5674655327770149ed9833a189e4c63340ab3837f74e2145411ac15ff7133ad083628a08038829d12140b1bfd6bb669476e904203f62ec2863747a4009345110063786e931d51033d8965ddecbe856819a9e87b0d5e212cbb8c54a90c11d3f801970485f4bb2e91b21279bbbf4db8cd0f75d4c30b5b2b0be2f8d1b427be6a902483303e2464ee7facd1712a18b", 0x92}], 0x8, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x1, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'bond0\x00', 0x40}) recvfrom(r0, &(0x7f0000001740)=""/78, 0x4e, 0x10000, 0x0, 0x0) 20:19:33 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') write$binfmt_aout(r1, &(0x7f00000001c0)={{0x1cf, 0x0, 0x9, 0x172, 0xaa, 0x401, 0x1bd, 0x97b}, "ce99b1267b1c63ee2f115b3a", [[]]}, 0x12c) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r2, 0x8, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0xfffffffffffff9b1, @bearer=@udp='udp:syz2\x00'}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) 20:19:33 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x50c04, 0x0) 20:19:33 executing program 4: ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r0, &(0x7f0000000040), 0x80) write$P9_RAUTH(r1, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={0x0, @broadcast, @multicast2}, &(0x7f00000000c0)=0xc) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in=@multicast1, @in6=@mcast2, 0x4e20, 0x6, 0x4e20, 0xffffffff, 0x2, 0x80, 0x80, 0xbf, r2, r3}, {0x49, 0x6, 0x1000, 0x1f, 0x1, 0x45, 0x0, 0xd8cc}, {0x800, 0x0, 0x3ff, 0x5}, 0x7, 0x0, 0x1, 0x1, 0x2, 0x3}, {{@in6=@mcast2, 0x4d2, 0x7f}, 0xa, @in=@multicast2, 0x3501, 0x4, 0x1, 0x9, 0x5, 0x1ff, 0x106e}}, 0xe8) 20:19:34 executing program 0: mkdir(0xffffffffffffffff, 0x80000007e) r0 = open(&(0x7f0000001340)='./file0\x00', 0xfffffffffffffffd, 0x0) mkdir(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) splice(r0, &(0x7f0000000140), r1, &(0x7f0000000180), 0x1, 0x1) prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ea5000/0x1000)=nil) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0) signalfd4(r0, &(0x7f0000000000)={0xfffffffffffffffc}, 0x8, 0x80800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sysinfo(&(0x7f0000000080)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000001400)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 20:19:34 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x0, 0x40, 0x4}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x800, 0x4, 0x4, 0x8000, 0x6, 0x3, 0x3e, 0x3, 0x3, 0x38, 0x31e, 0x3, 0x80, 0x20, 0x1, 0x861a, 0xbf, 0x35}, [{0x7, 0x0, 0x8, 0x9, 0x7, 0x200, 0x3, 0x4}, {0x70000000, 0x6, 0x100, 0x837, 0x7, 0x0, 0x5, 0x6}], "178d8dd48c77c5f77ce62f84929cd9a7662f2061e42ef76c714c347426c2d3ac077a1888ada36d", [[], [], [], [], []]}, 0x59f) timerfd_create(0x7, 0x80800) read(r0, &(0x7f0000000300)=""/71, 0x19) 20:19:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getuid() bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r0, 0x400000000000001) 20:19:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000000c0)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) 20:19:34 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x12000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=@raw={'raw\x00', 0x9, 0x3, 0x308, 0x120, 0x0, 0x120, 0x120, 0x0, 0x270, 0x270, 0x270, 0x270, 0x270, 0x3, &(0x7f0000000040), {[{{@ip={@multicast2, @dev={0xac, 0x14, 0x14, 0x1a}, 0x0, 0xffffffff, 'bcsf0\x00', 'teql0\x00', {}, {}, 0xff, 0x3}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x5}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @empty, 0x1000, 0xf, [0x13, 0x1d, 0x18, 0x1c, 0x6, 0x3a, 0x39, 0x18, 0x3d, 0x1a, 0x15, 0x5, 0x38, 0x34, 0x30, 0x18], 0x3, 0x4, 0x5}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@unspec=@mac={0x30, 'mac\x00', 0x0, {@broadcast}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x8, [0x5, 0x3, 0x4, 0x0, 0x7, 0x100000001], 0x1, 0x4}, {0x398, [0x2, 0x1, 0x5, 0x3, 0x4, 0x6], 0x9, 0x1}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 20:19:34 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x40000000, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x80045439, 0x80) 20:19:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x20) tkill(r1, 0x6) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) setpriority(0x1, r1, 0x1b) ptrace$cont(0x1f, r1, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 20:19:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x73a771c9) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f00009f5ffc)=0x1, 0x4) getsockopt$inet6_int(r0, 0x29, 0x48, 0x0, &(0x7f00007d0000)) 20:19:35 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000019007f5300fe01b2a4a280930a600000ffa843359154bda02c0001002caa976b00d1000019000500fe800000000000d21338d54400136ef75afb83de448daa7227c440b8220000060cec4fab91d4000000", 0x55}], 0x1}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000140)) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000100)=0x10000, 0x4) 20:19:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000180)=0x57b8, 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000480), 0x4) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 20:19:35 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0xdc8c267, 0x1, 0x6}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x80045439, 0x0) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x3d) [ 1249.041386] kauditd_printk_skb: 394 callbacks suppressed [ 1249.041395] audit: type=1400 audit(1554668375.245:51790): avc: denied { create } for pid=27855 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1249.183175] audit: type=1400 audit(1554668375.245:51791): avc: denied { write } for pid=27855 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:19:35 executing program 3: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000006880)={&(0x7f0000006840)='./file0\x00', 0x0, 0x10}, 0x10) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00') mlock(&(0x7f00005b8000/0x3000)=nil, 0x3000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0x9, 0x0, 0x1800000000000000}}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) mmap(&(0x7f000060b000/0x1000)=nil, 0x1000, 0x1000008, 0x33, r0, 0x0) unshare(0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000540)='./file0/file1\x00', 0x2100, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.current\x00', 0x0, 0x0) ptrace$getregs(0xc, r2, 0x1000, &(0x7f0000000240)=""/64) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x7, 0x800, 0x1ff, &(0x7f0000000480)) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000580)=ANY=[@ANYBLOB="00042abd7000d9207d042744a81a0c0007100800060055d101e57239f5598d731629d60000004c00090008040100f10800000889c9000600001b082401009816cf3c1d03851e00001000080300000000e2ff080002000010000008000000000000000800010029fc00000800020009000000d5c876344c28b215ef921653796e086066761e768e9eb02e9f0dcbc3e8c8238f2c7bb102f5e9282a56ef0ddc5f881f07c7d5ade0f7580d4c8122f281e39affac8b84fe7fd23eff1de30a203e03d4e2eb6d02ea07ee96035703"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x8000) r5 = creat(&(0x7f0000000280)='./bus\x00', 0x1) ftruncate(r5, 0x2008200) r6 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r5, r6, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x20) [ 1249.285010] audit: type=1400 audit(1554668375.305:51792): avc: denied { map } for pid=27858 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:35 executing program 1: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) unlink(&(0x7f0000000040)='./file0\x00') ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) [ 1249.411293] audit: type=1400 audit(1554668375.305:51793): avc: denied { map } for pid=27858 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1249.496739] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.0'. 20:19:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x32}, 0x0, @in, 0x0, 0x1}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000580)=@in={0x2, 0x4e21, @multicast2}, 0x80, 0x0}}], 0x2, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x40, 0x0) [ 1249.578329] audit: type=1400 audit(1554668375.315:51794): avc: denied { map } for pid=27858 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:35 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r1, 0xf, 0x3}, 0x14) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x27, 0x11, 0x9, 0x8, 0x1, 0x8, 0x6, 0x4a, 0xffffffffffffffff}}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000080)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) 20:19:35 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x4400, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x3df2, 0x80]) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x21200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x201, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x40) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x600, 0x0) ioctl$TCXONC(r2, 0x80045439, 0x0) [ 1249.743499] audit: type=1400 audit(1554668375.315:51795): avc: denied { map } for pid=27858 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) ioctl$TUNSETFILTEREBPF(r0, 0x800454dd, &(0x7f0000000080)) [ 1249.855879] audit: type=1400 audit(1554668375.325:51796): avc: denied { map } for pid=27854 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:36 executing program 1: r0 = socket$inet(0x2, 0x3, 0x4) accept(r0, &(0x7f0000000000)=@ax25={{}, [@remote, @null, @bcast, @default, @rose, @rose, @remote, @default]}, &(0x7f0000000080)=0x80) r1 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@broadcast, 0x0, 0xff}, 0x0, @in=@empty}}, 0x1de) [ 1250.038045] audit: type=1400 audit(1554668375.335:51798): avc: denied { map } for pid=27854 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:36 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x291adcf1}) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000000c0), 0xa) ioctl$TIOCNXCL(r0, 0x540d) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000500)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000380)={&(0x7f0000000140), 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="06000000", @ANYRES16=r2, @ANYBLOB="100027bd7000fbdbdf25030000001400010000000000000000000000ffffac141413080003000000010008000300fdffffff1800040001000000050000000000000001000100050000000c0004000900000001000080080003008000000008000500040000001400010000000000000000000000000000000000080005000300000008000300ff010000"], 0x90}}, 0x448d0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) r7 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r7, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r5, r7, &(0x7f0000000000), 0x60000) getpeername(r4, &(0x7f0000000440)=@nl=@proc, &(0x7f0000000240)=0x80) fcntl$addseals(r7, 0x409, 0x8) fremovexattr(r7, &(0x7f0000000040)=@known='system.posix_acl_default\x00') dup3(r6, r7, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f00000003c0)) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x110410}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="fc78898d57d176cb9224", @ANYRES16=r3, @ANYBLOB="01092abd7000fc94a021e34aefdbdf25030000000800030000000080080006001f00000008000300800000000800"], 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004040) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000400)=0x1) [ 1250.165373] audit: type=1400 audit(1554668375.335:51797): avc: denied { map } for pid=27858 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1250.239424] audit: type=1400 audit(1554668375.345:51799): avc: denied { map } for pid=27854 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr\x00') setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x3, 0x4) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x20000000000010, 0x2, 0xc) write(r1, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r1, &(0x7f00000000c0)="1f0000000104fffffd3b54c007110000f30501000b000200000013000200cf", 0x1f) 20:19:36 executing program 5: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB='#'], 0x1) io_setup(0x100000000, &(0x7f0000000000)=0x0) io_getevents(r4, 0x100000001, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f00000000c0)={0x0, 0x989680}) writev(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 20:19:36 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x10000, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3087, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 20:19:36 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x80045439, 0x0) [ 1250.842534] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1250.954619] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 20:19:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$instantiate(0xc, r1, &(0x7f0000000080)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', '', 0x20, 0x4}, 0x2a, r2) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x2, 0x2c, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 20:19:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) ptrace$setsig(0x4203, r4, 0x80000001, &(0x7f0000000140)={0x0, 0x3af, 0x321f}) lchown(&(0x7f0000000400)='./file0\x00', r5, r6) preadv(r3, &(0x7f0000000700)=[{&(0x7f00000004c0)=""/65, 0x41}, {&(0x7f0000000540)=""/205, 0xcd}, {&(0x7f0000000380)=""/38, 0x26}, {&(0x7f0000000640)=""/158, 0x9e}], 0x4, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') write$P9_RXATTRCREATE(r3, &(0x7f00000003c0)={0x7, 0x21, 0x2}, 0x7) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="000727bd4f00feb9df81000000000c000000"], 0x20}}, 0x1) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000340)) 20:19:38 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x9, 0x4) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000080)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000200)="030400000300600000000000fff55b4202938207d9fb3780398d537500e50600591f301ee616d5c01843e0650053c0e38547fc1b09252da70100af5ba514d40000efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000000d1843e770afd6e9ef5837dbd0000", 0x6c, 0x0, 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet(r0, &(0x7f0000000300)="ed", 0x1, 0x8004, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x242000, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={r5, r6, 0xf, 0x1}, 0x10) sendto$inet(r0, &(0x7f0000000000)="dd", 0x1, 0x0, 0x0, 0x0) 20:19:38 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x1fd, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x10000000000, @local}, 0xfffffffffffffc27) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) capget(&(0x7f0000000100)={0x20080522, r4}, &(0x7f0000000240)={0x2, 0x0, 0x6, 0xfffffffffffffff9, 0x1, 0x5}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3ffffffff, &(0x7f0000000440)=0xfffffffffffffffd, 0x14c) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000400)) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e22, @multicast2}, 0xffffffffffffff90) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x1000, 0x800000000, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000004c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) ioctl$KDDELIO(r2, 0x4b35, 0x8) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) rename(&(0x7f0000002300)='./file0\x00', &(0x7f0000000580)='./file0\x00') r5 = socket$key(0xf, 0x3, 0x2) prctl$PR_CAPBSET_READ(0x17, 0x21) getsockname(r5, &(0x7f0000000300)=@alg, &(0x7f0000000280)=0x80) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x80, 0xfff, 0x0, 0xf, 0x2, 0x8, "251c88068803793a89c696b9749c73cb995353c3d8df03048e91658ab9906d6556920a3ff64f85cc4275b0a21dcc054cee7d8b61bf6764ff7da833d80fd136f0", "2475f3efa518d2bdc54a3d745ef09dbcebbdb0ff487c27d106851b485d6f8b49d650810fc7be598d6c32ef556c2df29752ba0ac37d82b36b9c926af00ae7e931", "b6f6c0116256f480baa70981af55ee587ffadfec56106feed668d83405f97d50", [0xf6a, 0x8]}) sched_setaffinity(0x0, 0x1fb, &(0x7f0000000500)) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000140)) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000540), 0xc) creat(&(0x7f0000000200)='./file0\x00', 0x45) 20:19:38 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000000)) 20:19:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, 0x0) exit_group(0x0) clone(0x40000104001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x1, 0xfffffffffffffffe, 0x20000000, 0x9f}) ptrace$setregs(0x400d, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:19:38 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000040)={0x7, 0xfffffffffffeffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x80045439, 0x0) 20:19:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0x36, 0x0, &(0x7f0000000100)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d500000001000000140000050024", 0x0, 0x400}, 0x28) getsockopt$inet6_tcp_buf(r0, 0x6, 0x2b, &(0x7f0000000140)=""/115, &(0x7f0000000040)=0x73) [ 1252.817025] syz-executor.3 (27965) used greatest stack depth: 23120 bytes left 20:19:39 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = openat(r1, &(0x7f00000004c0)='./file0\x00', 0x1, 0xc2) ioctl$TCXONC(r0, 0x80045439, 0xfffffffffffffffc) sync() pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000000)="cf93a98e4574bcad7f76d0808e694382d795b7845edf11740c6cb0b7d272e7a2bce97102c609ef76feeda186a9fe23f34d6d8219a69ac1c2ff07c0486afad6a7e13d22a18a1dff0f62c0171dee30c5dccbffdbd28d10f92c1b292c54193fbdc768a5ff3cf979197d54284dc55169a0ef8138ed18a0cf11161193853a446008279baa53e2d2f3e03a461da2a8950e5fd671c5f2b41176bd44c5b6dea3e86181742e01b4afbff53f70a75a119eae9cf88d35667c4df5b8d8164e23d81392a382e719f3c422f99295ce75bb0cb9083a6b87ab22969104f9f83a9d466ba32ec191d40865bae5f1576bf201c409", 0xeb}, {&(0x7f0000000140)="8ba03effc497d70af8e7b5546b305b14875e74e8e91aa442e78a03d453e1e399f00c57e400f54388b54f919df8de4f2cb3516de4ec30c04b6f35ed08d87d569848f34efeafd285696a7eec4857af2ef71e4d7326b41cc3a470330fe51abec2141be77ccd0f5092005a32d95882b9bfdf23f3550b0add84a0cf1968b30e028e3d3c9a28c3aa41774156f8eaf8ba9d31911ecd799c8345ee085b0cb59f00acda5e0ca24f3f64694396e03040089651f803967c3523808fa7a831284d7bd1089614a0b6d01c096485cfc985f64b53", 0xcd}, {&(0x7f0000000240)="65ed0c0e67756790e0f7a55be80232eff5f9eef4e08e5174f801644101373e2040f7619514d1df6eaaca8d219b68ee44ac5cf05c3a54d1695d480d6d35783c3d55373451c8ad8efa849524ab0125e03050e3b18a13e3fe4c3b8633cead7cf0309b0d93b9e4aa213cb0103349a02b834535b4c5d37eb096bc0a7deeecc415f2e06d6806ba12184e30f78d7e8a0c48013a61b5ac2271be21188e3868f02a31da04ffeb7a265b54c54eaddaa9a9d810230362fb", 0xb2}, {&(0x7f0000000300)="68bc9514dc86196ae07475e0f9839ac6714a66b854e68c7e649b55846c3afbb62adfb0ca5a1475e86ba6b006eee071e1ef8742a543f057268482bee0617b11f60da0a0d44c5279cfeb4854db095bcf5902dd9e4d1ead4310a521b0a1e625fa27074479a7f28b2b962c623b1691a442d7b28131af3e1f06e996459ef6b1bc534a25479db370816bc584c970b8db5ea50c", 0x90}, {&(0x7f00000003c0)="da05a31e0be41535ca8b9db09fbd666611", 0x11}], 0x5, 0x0) fallocate(r0, 0x1, 0x6, 0x1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3dff607b5d2884ee04cd0611d0443497381668e04237407d1b83a83f1510a0855c928cd7708a6fde65d008ab1a486262f047b557e29adb1b2cd43ce3f1cd78c500eb52745b986a2689f7670991c91396d051f7d61b967a22d79a0426064e475db62fa1fff182ba5b075eb704fe816e947ef24377c7d6f6531adb43fb2b574ee4046ff207db149a710a", @ANYRES16=r3, @ANYBLOB="000528bd7000fcdbdf2501000000000000000c410000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x48040}, 0x48000) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000640)) 20:19:39 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x4000000000000001, 0x36, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) futex(&(0x7f0000000000), 0x8c, 0x0, 0x0, 0x0, 0x1) 20:19:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) pwritev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="9a01f9e3a50f660db1c7697e56c6a3fa835cd5792354a06059e8802482d34c0c5677398954fc0a1ac8978dcf737e22fced68932a270340e6c57190317cd3ce55b86f15ff3136f3934912542b70552ceb0576d0529fa2cc089f99823de095c3a3d2f2de596d893c6aba0fc9fb5038293b3203dfb57a42f3cf638046d0f3dc2e276bf65a67ecb36a04dcfc2c0b6d7b1e2716598597b84d8cb9fda87e3bd45b379165015c06558cba3296501702dca5c140b6388d4c42ae67faae8a5c487044b5502237efa9626caa537c8f92f2563864d1e3b6e34e407ad4eba5046eacb0dc4215f7b8c71f28a8e317300001c626f3f1de29234ca1d49b276681a700", 0xfb}, {&(0x7f0000000200)="779e0b0243097cedf902a5e32fe32d9b123b462ac316222628d65610121b6772e8cb963f50b005f44bfdac8a9d33d44103da2798f21f3357443e1daadddbb66e4c3a0e8ff387fc9195314ebb6d3d5b9573e2d464f3de0f7f8644f208fbe48aabc4dbe345c6e91e8c48f8fdd901a3908a0dd35ac46c0119da1fdd0f6f5052325e0d88c77dd2cd7e0e66dc39edf4b7b7663fbb57dfe734d101c5c62d22e2b6c62a382e7750ce4092db29ec162190c1a585d867515e49a0858e38f8dc208e03fa411700d9501dfa0d649a74bccdcc7f19b29695904035991af0bf5cf54904b61fdb0e0fbe160d8c", 0xe6}, {&(0x7f0000000100)="d631a1dfeb7976a7d74541e9544b7b87294dd3488af4461865f81c01c1b25ae45f9c5117fbef48d50d04d09e7c73", 0x2e}, {&(0x7f0000000380)="9d48182206e4bc692881306d67ab4124417a981d3c3cb8e1bbfa01641d34202bbf10c369c03ef0e61d941b7d406251030d702a917abe1c70b22fb55fe661afc88b4ed63c97d2910de4ce4898ee758c370c", 0x51}, {&(0x7f0000000400)="aa2ea64738b8beea3ebfeca1e07efd8376dd96634a934ec1fd24f4e8759c3fc4d0555afaf15ba8fad1bef52b4ec91e718b85bcf82a6cdf186ac5940fd9814e520bf3163ea548a26ee35ee4c885995f7057", 0x51}], 0x5, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5473, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, 0x0) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x0) [ 1254.057329] kauditd_printk_skb: 351 callbacks suppressed [ 1254.057339] audit: type=1400 audit(1554668380.255:52151): avc: denied { map } for pid=27990 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:40 executing program 0: madvise(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x19) madvise(&(0x7f0000000000/0x4000)=nil, 0x0, 0x0) 20:19:40 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000040)={0x4, 0x7, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x80045439, 0x20008) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x83053, r1, 0x1f) [ 1254.165402] audit: type=1400 audit(1554668380.295:52152): avc: denied { map } for pid=27990 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1254.304137] audit: type=1400 audit(1554668380.305:52153): avc: denied { create } for pid=27984 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1254.440131] audit: type=1400 audit(1554668380.305:52154): avc: denied { write } for pid=27984 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1254.591382] audit: type=1400 audit(1554668380.315:52155): avc: denied { map } for pid=27990 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1254.727965] audit: type=1400 audit(1554668380.325:52156): avc: denied { map } for pid=27990 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1254.828661] audit: type=1400 audit(1554668380.355:52157): avc: denied { map } for pid=27995 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1254.946197] audit: type=1400 audit(1554668380.365:52158): avc: denied { map } for pid=27995 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1255.053180] audit: type=1400 audit(1554668380.405:52159): avc: denied { map } for pid=27995 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1255.218373] audit: type=1400 audit(1554668380.405:52160): avc: denied { map } for pid=27995 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:42 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x440, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 20:19:42 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc6a1) unlink(&(0x7f00000000c0)='./file0\x00') close(r0) r1 = dup2(r0, r0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000080)='./file0\x00', 0x0, 0x2002, 0x0) readv(r1, &(0x7f0000000640)=[{&(0x7f0000000100)=""/147, 0x93}, {&(0x7f00000001c0)=""/72, 0x48}, {&(0x7f0000000240)=""/253, 0xfd}, {&(0x7f00000003c0)=""/250, 0xfa}, {&(0x7f00000004c0)=""/205, 0xcd}, {&(0x7f0000000340)}, {&(0x7f00000005c0)=""/101, 0x65}], 0x7) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) poll(&(0x7f0000000040)=[{r0, 0x3120}, {r0, 0x2}, {r0, 0x200}, {}], 0x4, 0x8) 20:19:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0xc, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b6300000463044010de1cd834af04000000db3e418dbeaa538080737b0de54ad85097f897096a7e298537380a88845664e8ea7302d8a4e2bf8a905b0df0924f596efa76f29231895d320000500fb4b8894fa3ed14c77ab05b6e6499c456f4b100007ae2eef75dc2337dcf6897b71539b0e3907022fd25e38562289d5a962cf192511a59d2f8b9d9d470de2a826ded6bf43dd8d244e3f2f60eb41a3d6d21d881e6cf594c5a4dbdefdfa7250cc969cfd5b05db6b7935338fd2b1be0000000000000000000000091544f9e780c1f618496ff6ac0d72afa7f2184c5387c80bd0835712e3bb623a89fb6e3"], 0x98, 0x0, &(0x7f00000000c0)="41ef7fc54d2f788d19961d918b59fc2f1c4fd7958f1c6b86778c6ba47eed75db23c587cc135bd2d66c05031b5f38c972c0419ae581798561f523ee6c5413291336aca5e18354414fbf729a5af5da2d5776cff0c4934cca150a1c21ef2df0ff301a1c232cc6c576856eb746e42f5c13c0363d5188b5796b2aff0885d053c4110bafcaa40270d8efa94be8422cb895c4eaeef8ea8e0dd6b188"}) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000000), 0x84000) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x40001) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) remap_file_pages(&(0x7f0000736000/0x1000)=nil, 0x1000, 0x1000000, 0x1, 0x10000) 20:19:42 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) r3 = dup(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) timer_create(0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) recvmmsg(r3, &(0x7f0000009f80), 0x1, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) syncfs(r0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) fsetxattr$security_smack_transmute(r3, 0x0, 0x0, 0xffffffc6, 0x20100005) lseek(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x2) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ioctl$PPPIOCSPASS(r4, 0x40107447, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, 0x0) ftruncate(r4, 0x80003) sendfile(r1, r4, &(0x7f00000000c0), 0x8000fffffffe) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0x14, 0x0, 0x299) 20:19:42 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x3) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x0) 20:19:42 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capget(0x0, 0x0) gettid() getuid() fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(0x0, 0x0, r1) arch_prctl$ARCH_GET_GS(0x1004, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x4) r2 = syz_open_dev$loop(&(0x7f0000000640)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)={0x2, 0x1, 0x23, 0xada1, 0x7ff, 0xfff}) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0xffffffffffffffd4, &(0x7f0000000800)}) 20:19:42 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x4) fsync(r0) 20:19:42 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000080)=0x10000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x80045439, 0x0) write$P9_RFSYNC(r0, &(0x7f00000000c0)={0x7, 0x33, 0x2}, 0x7) 20:19:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x100e, &(0x7f0000000000)="18000000020001000000be8c4bff8c88580000110203000008000000000000400a0033d898056bf748bb6a8807567e59db01f81947b3550400000067a1e20059fc21e3e000000000000453ff1f00080000000000038ebbff06281c2a6be33e7a0fd9b0c30100000b01000000b121ad1474d722f542002700ec008b000800c500000100e9f57406aa010b000400264a64d2078a1864c84310abea04aa56da2d55aee65d7299865d1294333e162eda00b776b553502e0a7c731dc4e94a1ee130b2", 0xc0) 20:19:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)}, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r3, 0x0, 0x1000) r4 = memfd_create(&(0x7f0000000000)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x2) gettid() ftruncate(r4, 0x40001) sendfile(r2, r4, 0x0, 0x100000000002) creat(0x0, 0x49) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) fcntl$addseals(r4, 0x409, 0x8) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) dup2(r4, r3) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000000c0)=0x800, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000238, 0x0) 20:19:43 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000002c0)=r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x10000, 0x0) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000040)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00', 0x1e}) ppoll(&(0x7f00000000c0)=[{r3}], 0x1, &(0x7f0000000100)={0x0, 0x989680}, 0x0, 0x0) 20:19:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x2000003, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3", 0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x80000000, 0x17, 0x1ff, 0x0, 0x400, 0x2, 0xb, 0x1ff, 0x0, 0x2, 0x80, 0x6, 0x76a9ea25, 0x9, 0x3, 0x6, 0x1, 0xcbfc, 0x3, 0x100000001, 0x100000001, 0x3f, 0x9, 0x4, 0x7, 0x26c0000000000, 0x1, 0x6, 0x101, 0xde1, 0x2f6d, 0x6, 0x4, 0x7, 0x1, 0x0, 0x7fff, 0x1, @perf_bp, 0x100, 0x3, 0x2, 0x7, 0x8}, 0xffffffffffffffff, 0xe, r1, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x1, &(0x7f0000000180)={0x2, 0x3, @empty}, 0x10) 20:19:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x105200, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000040)={{0xffffffffffffffc0, 0xffffffff, 0x1e152f22, 0x6}, 'syz0\x00', 0x16}) getsockopt$inet6_int(r0, 0x29, 0xcb, 0x0, &(0x7f00000000c0)) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000280)={@local, r2}, 0x14) finit_module(r0, &(0x7f0000000140)='-\x00', 0x3) 20:19:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) socket$packet(0x11, 0x0, 0x300) getgid() r0 = getgid() setgid(r0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x38}}, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8001, 0x0) r3 = geteuid() write$P9_RGETATTR(r2, &(0x7f0000000140)={0xa0, 0x19, 0x2, {0x20, {0x20, 0x1, 0x7}, 0x2, r3, r0, 0x401, 0x8000, 0x1, 0x88, 0x32b, 0x0, 0x8000, 0x8, 0x1, 0x8, 0x200020000000, 0x2, 0xffffffffffffff3e, 0x7, 0x80}}, 0xa0) 20:19:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="240000001c0007041dfffd946f6105000700000033000000000002000800a3a20400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) 20:19:43 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000080)) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) read$eventfd(r1, &(0x7f0000000000), 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mlockall(0x2) tee(r0, r2, 0x3, 0x0) close(r1) 20:19:43 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x800) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = creat(&(0x7f0000000300)='./file1\x00', 0x0) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xfffffffffffffe41) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6(0xa, 0x3, 0x84) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000000)={0xcac, 0x15, 0x8, 0xfff, "9346c1b99e0faae0a62d30bbe7c1f4eb1fce936d48428fd11bfd9d36f954de7d"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 1257.751075] PF_BRIDGE: RTM_NEWNEIGH with unknown ifindex [ 1257.811409] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1257.869342] PF_BRIDGE: RTM_NEWNEIGH with unknown ifindex [ 1257.907138] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:19:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) 20:19:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cmdline\x00') ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f00000001c0)={0x100, 0x2}) r1 = socket$packet(0x11, 0x3, 0x300) write(r1, &(0x7f0000000000)="c721e8d99cdb8775de92657a67690b4125b3cd3ab1c287a83312328b432c21569086b84120e63c032f00e02d8cf139b5f190b8bb37ad5b32409f498cd24df727cb8d2644690a6374cf9b41c6383dae7f2e4c9349a22a9ffcf942e08f3311852fef1e880d", 0x64) request_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='cmdline\x00', 0xfffffffffffffff9) r2 = socket(0x2, 0x4, 0x7ffffffe) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x31b, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x14}}, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) ioctl$TIOCGPTPEER(r3, 0x5441, 0x6) 20:19:44 executing program 5: gettid() r0 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f17}) r4 = socket$nl_route(0x10, 0x3, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 20:19:44 executing program 2: futex(&(0x7f000000cffc)=0x400001000000004, 0x80000000000b, 0x8000000000004, 0x0, &(0x7f0000000000), 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080), 0x4) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 20:19:44 executing program 1: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) fsync(r0) keyctl$join(0x1, &(0x7f0000000240)={'.yz'}) [ 1258.683306] device lo left promiscuous mode 20:19:44 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80}], 0x1, 0x0, 0x0) r0 = creat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='status\x00') getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000001c0)={0x0, @broadcast, @multicast2}, &(0x7f0000000200)=0xc) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@bridge_delneigh={0x5c, 0x1d, 0x430, 0x70bd26, 0x25dfdbfe, {0x1f, 0x0, 0x0, r3, 0x10, 0x10}, [@NDA_DST_IPV4={0x8, 0x1, @multicast1}, @NDA_DST_MAC={0xc, 0x1, @random="b55fa1546da9"}, @NDA_MASTER={0x8, 0x9, 0xf400000000000000}, @NDA_PORT={0x8, 0x6, 0x4e23}, @NDA_LLADDR={0xc, 0x2, @dev={[], 0x13}}, @NDA_PROBES={0x8, 0x4, 0x6}, @NDA_SRC_VNI={0x8, 0xb, 0x401}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008044}, 0x81) preadv(r2, &(0x7f00000017c0), 0x1be, 0x0) [ 1258.770481] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:19:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xffffffff, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) dup3(r0, r0, 0x80000) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x3f, 0x4) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000100)=0x8) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @empty}, 0x1c) [ 1258.850472] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:19:45 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000200)="609c953cc8497ed2ddb3614a332238bfd6cba7df72bf527eb07fac5949e11214b5a49cf50315f4d697b2f8a974cba960f1b8c32a89b291f1b7986b9f668abdfbf07a01149f43ae224a03d0eebe49e3d95db89dc47c55c40772bdbdc1e05ed013863504f731692e7a95a3355e41e19200cb3b0494a597d948a591fc19a81d62521863faef4ab19ef3546c80f04ec72a039c216637cbbf2e9998ce0ff588b5", 0x9e, 0xfffffffffffffffb) r2 = request_key(&(0x7f0000000100)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)='\x00', 0x0) keyctl$unlink(0x9, r1, r2) read(r0, &(0x7f0000000140)=""/143, 0x8f) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="f9c1b6221c122024252f762f9c7055f6"}, 0x1c) [ 1258.990141] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:19:45 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4801) getsockname$packet(r1, &(0x7f0000000240), &(0x7f0000000280)=0x14) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="50000000140003020000000000000000ac1414000000000000000000000000000000000000000000000000000000000100000000000000000200208000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff03010000000000"], 0x50}, 0x8}, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000040)={{0x2, 0x4e20, @remote}, {0x306, @remote}, 0x14, {0x2, 0x4e23, @loopback}, 'netdevsim0\x00'}) [ 1259.074062] kauditd_printk_skb: 267 callbacks suppressed [ 1259.074071] audit: type=1400 audit(1554668385.275:52428): avc: denied { map } for pid=28108 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1259.170205] binder: BINDER_SET_CONTEXT_MGR already set [ 1259.205974] binder: 28087:28118 ioctl 40046207 0 returned -16 20:19:45 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x200000004}) r2 = dup(r0) dup(r1) ioctl$TIOCSBRK(r2, 0x40044591) [ 1259.245984] audit: type=1400 audit(1554668385.315:52429): avc: denied { map } for pid=28108 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1259.355831] audit: type=1400 audit(1554668385.345:52430): avc: denied { map } for pid=28087 comm="syz-executor.0" path="/dev/binder0" dev="devtmpfs" ino=5428 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 20:19:45 executing program 0: r0 = epoll_create(0x15b4) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0, &(0x7f0000000100)={0x5}, 0xfffffffffffffd4f) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x1, 0x2}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000340)=0xc) fcntl$setownex(r0, 0xf, &(0x7f0000000380)={0x2, r2}) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) fsetxattr$security_evm(r1, &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000240)=@md5={0x1, "1b0d6fe0739a442033b02999f899a93f"}, 0x11, 0x2) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, &(0x7f0000000300)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffeec) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x10000014c) lsetxattr$trusted_overlay_origin(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000440)='y\x00', 0x2, 0x3) eventfd(0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1259.456573] audit: type=1400 audit(1554668385.355:52431): avc: denied { map } for pid=28108 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:45 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff1f75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)=0x9) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_proto_private(r1, 0x89ef, &(0x7f0000000500)="f82c716cc125d43c39b9c9e22b287e1b442a9569b261fdae51651dfb319cfe8b0d7da4135c031205cb15c1f79f950863d3d50e33650c6ecd572e9923813b3127fbb0f23eab91456bdd795108cac1d4c5420fcdd75f1e1171d5b276077d9280d66c1b02e649625ed82eadb41c4eb181000b06638c8384cea443ee0a08a90dbcfec475b1f8cc9ff728a888ea3fdeb418ec731913b535c23e13584a7d6cd31a2629a48083cd2bdae84749b91b5823880f2430083fbfee6863315947432f95d04699b960459802221f4e626154b546a79f3987f54f2d5d6118fb67776be74d23d3cdb8a63ac775b15c4c737cfaede9ed0c") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000400)=0x1c0000000000000, 0x4) umount2(&(0x7f0000000000)='./file0\x00', 0x0) timer_delete(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000440)={0x80000001, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x28}}}}, 0x88) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r3 = accept4$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0x800) bind(r3, &(0x7f00000001c0)=@ax25={{0x3, @bcast, 0x2}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) close(r0) [ 1259.590099] audit: type=1400 audit(1554668385.355:52432): avc: denied { map } for pid=28108 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:45 executing program 1: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) write$P9_RATTACH(r0, &(0x7f0000000140)={0x14, 0x69, 0x1, {0x4, 0x0, 0x2}}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) getitimer(0x4, &(0x7f0000000180)) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000200)=0x6) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0x4) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010", 0x5}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x5, 0xb, 0x16, 0x1, "10062028e3cf1614530ae34a7024042534a937b4b26e73b80b00d1d55795112f1c5fb744ecc913b5b021b5df8ba00263d10285edfcbd9a93b9ae3e3db2f1675f", "fe5748d44c6bae0121e03b2392c1cd60288a5dd0b417cee8f287d0ddbe44acdd", [0xffff, 0x2a8]}) sendfile(r2, r3, 0x0, 0x2000006) memfd_create(&(0x7f0000001540)='Q\x00', 0x2) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x4) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x27e) syz_genetlink_get_family_id$ipvs(0x0) gettid() 20:19:45 executing program 4: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000017c0)=@broute={'broute\x00', 0x20, 0x4, 0x113, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]}, 0x18b) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}}], 0xfe72) r1 = dup2(r0, r0) flistxattr(r0, &(0x7f0000000040)=""/123, 0x7b) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000280)=""/212) [ 1259.700132] audit: type=1400 audit(1554668385.395:52433): avc: denied { map } for pid=28108 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1259.801981] audit: type=1400 audit(1554668385.445:52434): avc: denied { map } for pid=28108 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:46 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000680)=""/208, 0xd0}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000000200)=""/80, 0x50}], 0x3}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0xfffffffffffffffe, 0x0) setxattr$security_selinux(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:ipmi_device_t:s0\x00', 0x23, 0x1) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1259.951974] audit: type=1400 audit(1554668385.615:52435): avc: denied { map } for pid=28123 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:46 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)=0x8536) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x400000028, 0x7fff, 0x3f}, 0xe) [ 1260.111496] audit: type=1400 audit(1554668385.625:52436): avc: denied { map } for pid=28123 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1260.234136] audit: type=1400 audit(1554668385.635:52437): avc: denied { map } for pid=28123 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:46 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xfffffffffffffe27) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086604, &(0x7f0000000080)) dup2(r0, r1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 20:19:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x803, 0x0) write(r2, &(0x7f0000000100)="220000002100070700be0600000007010a00001e00000008f52a6d7d9ea3ff00043e", 0x22) r3 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f00000022c0)=0xc) getresuid(&(0x7f0000002300)=0x0, &(0x7f0000002340), &(0x7f0000002380)) fstat(r2, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r2, 0x10, &(0x7f0000002440)={0x0, 0x0}) fstat(r0, &(0x7f0000002480)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000002500)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee01, 0xee00, 0xffffffffffffffff, 0x0]) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000002540)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000002580)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000002680)=0xe8) stat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = fcntl$getown(r3, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000002780)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000002880)=0xe8) getgroups(0x4, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0]) sendmsg$netlink(r1, &(0x7f0000002a00)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfb, 0x84000004}, 0xc, &(0x7f0000002240)=[{&(0x7f0000000140)={0x12d0, 0x35, 0x702, 0x70bd27, 0x25dfdbfb, "", [@generic="08c20d775ca9e0317810c306fba09e715acc453f5fbc1568cc9322c2021e0554e3d8ff3efba79960b926956800fffcf47a598df403b63cf33893f9af7d367b966ff296", @typed={0x8, 0x4e, @fd=r2}, @generic="e1b8276aebe0505149c6ffe19380d7a66a78944b2fa6731013e0f7da152faaeb2bcfd81e92d876c60fba61e32959822100f2e8cf3fdbb8a60df32b9476e971ec53e38f93caf70c60bbbeaf3a5c74ee405d31284df30c27b4875404d35d003d00c384a2e9b7c0476e9d7b6b9a7442fb0f03c4473ca568c7fdaea1a1a7ce8ae2454d515950f268f0abfd502621a69c9b8da41aa1dd32d7ff808b7f4443b3e7a7743bf015f224aa622ee9d76ef15aaf0c4b2e73714d6fded9ff54722bf10c45b86ab0b3f944aa", @typed={0x8, 0xd, @fd=r3}, @generic="ab85d2d0ab0e943dffe3e7d65a3e0eadba2a677ac3de8a4f9048c9fdad4d599754be9001414971dca756b38f3c46ac31e93508aedb1a527c857d28b047a9f47bdca8a61c074b013c04aa73d9ecb420bb815f0d046cb520e1b756f926a1809da1d655b112afe2e111a1aa468832b1cfb50e3681c1dbc4ac7080ae19448eb4da5eec38a087f6d0d5", @generic="da549d97c8487006010bf99bce9b093a969c14954b41f17504dee9ecee214896755d8944c91f1d6ac5b58cf705ee618f1031bb3c8d9081ee213901aa0b42e92844c6ebfdeef9d0e784d1108775daada1a5cce20eeca7d76315f7771ad4239fe4a2b6fb80c729615a3a7beddff4bbbad8d9a6cd85123be583c3c0a51e", @generic="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", @typed={0x10, 0x2a, @str='mime_type.!\x00'}, @generic="b8c3d845c35324b1e193a91034017530dd37f0efc47c3b66c450d33ac27c9f12b20521e93a90bf85212ae1a08e453f4b4e3ee3d095b403aae3df3c79b310311394ac495d4b265dc74e6c6a50e96949e8148a9dc1a3120c4ed044f17dc1dc5ea85f9c62180751cdc9af6abb5b85902562469d5eb0e9acc8e586de24e68fc9e479a2248fb45c2dda4361bbf80c143f82ffe1cf16"]}, 0x12d0}, {&(0x7f0000001440)={0x278, 0x3b, 0xc1e, 0x70bd2d, 0x25dfdbfe, "", [@generic="c36aa2a624c103474f3bb99247b00abecf90824ecd4b93399a387dd221f07f688619276823c4c4073dcba4654598ce430738458af78e604211fdb3d134bfd4572e19a90b16784f63a4a0c4a1139281a4b5dcd273d9dc66ea981221308e89ea009509c78e5d98a500657dfaa60936d29fe0daa89a57a7df88951effe7fcfec067839a225382a4329081c375d1323ba8114b0430120a64dddf37326535015e8228922ac4ceb9cc9121d3c2aad5decf7f1265dc7b2f46cea31578f63fec4ef7bcf41c33665e900e6e2822e0236ec3b85d55a7a9af419723", @generic="0ff03feaea1df0c81470e06d5ce828705c92eae4035029d4c806f74c2bc1e8c7139fa46dd1bf25cc5e9eb6c391b55e38a9ea10737688cde53bcee74d47fc1f3a7fe38734293c6fccd68d8a6f07cf221e827dbf5771e6a36e0023de92a2898210dd2d6611716f0f3910b4d6ed2fa8c14f977eaf6549c9a97bb4", @typed={0x4, 0x48}, @generic="658c888ffee6f70610e6edbd661fed8d62c01482d5a7b494869d91901c214f03bb6f71710ee0ccd98fab415a57ca", @generic="a8a620426f841f1d6d95019f83a403c70958ceb8019118c50e45355ff8587061b5be7e48cc8798137d10a14c1e2517e29c19805f629a9a20208ddc3cfb3f6a724a2e25c372d206bf60e876c98e693c56f99fe24a523cc87b5b8fd35366d8dc9f0ea1106ef47640a18468a6dfafd134646810547c8eb1767d5a00f261e48812fbfc67ac3d7e43be880ef6023f6c47875f5d9baa74d7629b3adb934969bf6eada5a33df958a830ed656f30cf2ceb6a573ae8a3145813b8052d8dd989bc67d164d674faf6d6010c1051c32639208c141d5b3d80de2e4ad0cbf383a4c820cc51737d33d81cc999"]}, 0x278}, {&(0x7f00000016c0)={0x288, 0x22, 0xb30, 0x70bd29, 0x25dfdbfb, "", [@nested={0x278, 0x7f, [@generic="c0300016a655607777a0e5bfb85114b34954983036f50220febf4d637fae4a813e1db4e2412df8cdb23a44f908f5819a811d1f4d44bf9662bef4ef61b6443547d8f29b90881492994f", @generic="c28184a1fd7db912fbe6919dab59db333142b720167f54e7b9458b4d64aa37b369f584f163cb52bce67d18ee718c0bd6d4605e672d4bc75358e715f6c9f781901feee653db25c6b03931d4df8e13002521c805c3d74a7281f801b3714f871364fc1f2657aa9a5e98ae89c56f1b9a05af540eaaf620c439ae0605c7e2", @generic="7dfe68cab35328ade137eda2defdec3aa73fe81b9c3430a3bd1094ec5cf388280e5b9af0a1c00a3da56f0d340e6b7be3a69303b75b2f110d34bf2d3afc917ce21b8996474c3d7e93fcd79684c6030030e4a6b05725993711fe4f248264e01241220b3342d01fd0add0049030b43d24ab52d9d5ce1045c27776176d547c0a641531d13b63", @generic="f33b142d185aa2a72f167d539a4ab043b3190a5356f35269d72300b9dbca9d2621a106de5c6ee97d2b96160490a511f0a88eb726e88a399fb2ce48a7661dc815c290e2c1236bf068d9cce25bb662af6bf81917120e73ee30246e199709a64840f05230ca3518da5fdc90f2ae96", @generic="8dc07d379cc16c8346432d98cd320516c7791b4e8d2740a053f9546104058fe77116a0a69b48823ae592506fd5800c64ffd0a97bec2744969c8022139f1d2e9994fa0c41710b826572b9a79f13091f564a2dc1d34a953a125b10655a623acfe147b3c9280901f9dc1cfa7dc525315671a437ea883978ea65ebca357e8c3b9c553081f45e25be673bf65f72b7557ad4b0d82afbfb3ff4782b599918e1842483b583999074a48ffb8867e7", @typed={0x14, 0x13, @binary="7454b29fcd56d24a3b1ae75109"}]}]}, 0x288}, {&(0x7f0000001980)={0x2a0, 0x35, 0x0, 0x70bd26, 0x25dfdbfb, "", [@nested={0x16c, 0x39, [@typed={0xc, 0x40, @u64=0x80000000}, @generic="6355b1d1b71f269d27a997bc1799c311134686779ff96f0466743e95250d4d77591ba38cfffa7ecd6a1f613145571ec23172e83bb4df2a5598ab487586295c825f065b5533adca7ee5f8d15cec3baf58fb999f486b49b88d314383d2b08da58814c6c8519633ce5905513388b64f3ebf8f59792f0eb6627cc27fa16b0707ed34835be299615961fa2fb4cbd7e42c011274466425204c46dafba08e296c903a4be18a622a12858ce1e4975735f7d0705a46e330602dc1a316b15a2f143ba7902b6c0d98bfb7a11ab047", @generic="715467f3c2d88a151b5aeb95220df3ffb3e933548051095aa8e4d53ba75659a2ca930b9359d1a477cfa4ac039fb978becffd1afb6462f0e8b1aef893828848569c0223a4ed630f8d9c5546483e2e88f32a0117eea8294a161db1ea18931e9a261f5facff46a1c30aaac70f415e4ce1849c35bff88e13ce9f9e644b236fafbd57e9755a80f1799e64fc7bedbbd015c20775"]}, @typed={0x8, 0x85, @ipv4=@broadcast}, @typed={0x34, 0x64, @str='mime_typekeyring.keyring&^-GPL#vboxnet0\x1a@\'/eth1\x00'}, @nested={0xe0, 0x90, [@typed={0xc, 0x77, @u64=0x406}, @typed={0xd0, 0x8c, @binary="7b8339163484ac25ead3bdf00e12bee7314b470a5bba52bef8571651b8b01b17176c19be1b252ab3f2085fd57c94ad65a251999643be642d72b3289b53592f9c302e1c4eca8582e3ccf4f7cb50f66b7d9195bcaa4ea2f0fbc0ae4aa784a74faa0d2c3403d32f8e2334c1e929e1e22804e26c23cc9e87ad68591eb249ba2bb48c03c23cf86983a495dc7acc547ecdc9176f596d11b63fbdd6a34b56832318156567d2daa038d7aed16e65e72f5c225aba8c44a02ce1946a086fcf5e8f0269b3b53351e518cfba2103a11f"}]}, @typed={0x8, 0x8a, @u32=0x6}]}, 0x2a0}, {&(0x7f0000001c40)={0x20c, 0x1b, 0x105, 0x70bd28, 0x25dfdbff, "", [@generic="422e21f109f17225e4dc4c49fd79666a6ce78b40046808080783351652094173b2092f730b6e2e", @generic="77639792acbca640d9a9f96606b4161d1be4615e7944bcd84969079d0548", @generic="ea3f690b8acc4469c4def6f28f7b8cab98e6003d2e8a230711124265c985d5caa59219ca5d9e0ce01d3627b0e02c8f69cdfe1c8a7f5e8437b7d732e17f0cd0ee56f5bdcb6e04c192391264e80685c42c7a4c114f5160c5f570355a2d21e530e7abc96b5643ed5bfcdbb82780d81c8583981975b57855b263ffd9e1da0bcb7979269f43c70097b8ee1bd7c74934d241bdd3a88263e53d33c222c190fe1b7885267a52a0bdb91da4aae28e3969ac7e68cce242412ac699776faf9ec7434dd2625f5cf2975e02c703df19e19aaa56df6211eae6d20cc990a99b1582d72fdcd4bf9ea3", @generic="1aa36b085837a901c5f32761c6497266b49ea675c8a0a56b90df8b504dc0386d1faf5ea37b4cd309b186f06dde8d2a34860e065b9e488b1cdc63397cbaaba5e76f7ad12d62cb64005d209b268256ae31e1c9b7cbfb4361dba2e88c64e662ab822dd0f81b7a753c5f5332356c41b0255afb9c200f5cbf9548b5fb7c907c71b88ee1e71d7044122656edd030d86b5319166370225ecf0a474bb49905ae647b427a98e4787f0186874a34297dc3335253cfcac3d3b0579e7c5c25af9e953ba0719ad33eaa4578627f67a167ce094a926806248bf744"]}, 0x20c}, {&(0x7f0000001e80)={0x324, 0x23, 0x304, 0x70bd29, 0x25dfdbfc, "", [@generic="754fc070de1c51e8a33d10ac2224b15106d324838f780e704fbf5eb6daf5e033a5b9755da36091bf8f31344f40ab19396b9f3452d9a15fb04ed150ac6cbef8ee8ed2396b57f394a06d9947", @generic="942460984fcfc3ec189a79aa4539d0f9fe237b98ffbe14026bd721a261c4624916f1c00470c644dcf03f051a6123187b84bc25141fabaabcb0264006e5ee53b125c341a715777cafe61904ee2e828777", @nested={0x260, 0x8a, [@generic="504095f7ba27784403d3ac8105c1d81c1b2f57336806570518d4b8f11ec2d48c550dc3bc8783e2eadc19e14df0c3fa99341b7ad38fa04cd24e7ad3b6e9abf38088d2fd0b3a15275d96ffb29fbb1550696d397e321f149a2b965891a58ca7e44b42c8f4761c37718c332269f341028e1b", @typed={0x10, 0x50, @str='eth0keyring\x00'}, @generic="ef43a25f9c729cb89ecd262b36fee1d31683f9ec9ccbfc26ea37a327b42dea32471614d8509fbc1f3d63bd254909aeca37362d68e3fe3b24839707bc0581027ce2d2bff24bdc5e48317bb60a7e976b016acddaf57d115130feb1fb9f9ea995adf6212d0bac93f2acd6df42be2d9ba42d796f8e88fdbe61c01c631e61eb3251f9e787d51077e91d2c19b6fe406c3b4c83f6d25d1004a9e93658033292d03896a59493bb398c715985de4b195ff49cb2cd58043c7e5f7a588a99dcd2aa170a782ea0297c717caab9cdeccc4c1c15df57dd4456efaf2c0cfa7af51953fac9e86fc0057d533d17eecaabe575576ab8", @generic="70d342e70f216ec3db8d15413960ddc250a4c1a7f9e077dfdf2a71bd2259de5b2bfa1cb5c5359ba1549a853164db4f25dbe536161d8e2dc2cd38c9f7d4d0dbbd34e661892810109a3c8e4b606259b5d1efe887343b0882ca9d9208567b6437dd72c30564abc039", @typed={0xc, 0x2a, @u64=0x15}, @generic="d25e614a70ee56016cef0fbbdde5fe49a06a7fb05774fbab7e0d94ee204c8d24ad35fd970b316c22f3e6", @typed={0x2c, 0x81, @str='self{.vboxnet1em0%-\\md5sumGPLtrusted\x00'}, @generic="74f2d43980f5d699468cffa68f043f0c52143eea6381bd6d55754f986cce33b200b97c80b7"]}, @generic="f940a3280cd45855eca7bbc9a849e4bfc5bf57eef3b5"]}, 0x324}, {&(0x7f00000021c0)={0x6c, 0x33, 0x308, 0x70bd26, 0x25dfdbfe, "", [@generic="6aeaee9f9e5a8244f08061ac7520d24f741c143a9cc452da6c57eebd4a7903dc3e1d67c6c32bf3f130135e618980a617cfbd1c511d5127201522a2d64779d8cfcfed71441d86fd30a56fa21191d94e62768515775b209d1780c8605a"]}, 0x6c}], 0x7, &(0x7f0000002900)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x20, 0x1, 0x1, [r3, r0, r3, r1]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @rights={0x30, 0x1, 0x1, [r1, r2, r3, r2, r2, r3, r0]}, @rights={0x30, 0x1, 0x1, [r2, r0, r3, r2, r2, r1, r1]}], 0x100, 0x40}, 0x4080) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 20:19:46 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) fsync(r0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r3, &(0x7f0000007800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES64=r2], 0x8}}], 0x1, 0x20000800) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x80000, 0x0, 0xfff, 0x7}, 0x10) 20:19:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2104000, &(0x7f0000000200)="322addd6150e7910d72564bdb438314c5d16b555278d760fe4eb136007f85a4f5b25016eefc07aae9eadfb224de805617b8778771317047907a39f8d513fa73cd4c35df8bcc5f88cc3abfe2f51e426821ad6dd4c6f48e772a7c0b98d32444f961ddd9e5d585d39a24fdc4a0d719b78a8919a79d9e26becdbb4c5b5377757c633ad7257347d549159f9984ee5b0787bc11e6ba11fbf4cf1cd4dd6bb3d813529cbdfd25b0955f04809e8c09ab4bf5ae8072367f809f0e68af96b115eaa60b2e1956c14d8e06409043f5e63742631e81e54d494778585db76acfb75e3362d4ff3dc8c1a299eae15d719444c79229e", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000300)="3bf380108f325a82ec5fc510c1d294573bf664121a675c81ffac7abd503e677cfc26d111786aae0b63e7d3373e84c556") clone(0x2902001bfb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0x9) chroot(&(0x7f0000000000)='./file0\x00') r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/status\x00', 0x0, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x3c4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x44008608}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x60, r2, 0x400, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x77cf}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8001}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x2404c004}, 0x800) 20:19:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) readahead(r0, 0x3, 0x7fffffff) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000080)=r2) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x9, 0x657) r3 = dup2(r1, r1) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x4000000000000000, 0x4000000, 0x0, 0x8, 0x12, r2}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 20:19:47 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0xfffffffffffffff8, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="b8e784f59a0001000000000000000000ff0100000000005d63fbe0118c0000000000000001e00000010000000000000000001f000000000000000000000a3819323283bde5b10000007f000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/112], 0xb8}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x14, &(0x7f0000000040)={@mcast2={0xff, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800}, 0x20) 20:19:47 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RCLUNK(r1, &(0x7f0000000200)={0x7}, 0x7) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) sync_file_range(r1, 0x0, 0x0, 0x2) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={0x0, r1}, 0x10) fallocate(r2, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x2, 0x14, 0x0, 0x7, 0x1e, 0x0, 0x70bd2a, 0x25dfdbfb, [@sadb_x_sec_ctx={0x18, 0x18, 0x4, 0x6, 0xb2, "ff4ce15f331a957453aca0ee70dcf9ff5e064731c4bc5f06e27bea65d44615fd6ed9967203198bef96c1ae2a02296c2dc9ab3d566f86891b987b18124f1543591f29ef84f3c039e572f17bc9e60f821ff78877662b2eda2f8c361384e4dd6fcdb4f9389036fe6aa8abdf14417d43859ff2315b243ef333640926a318116b38721b0b2e2b4a33384fdf7b97301c0b88bc3d3c52c48c35df300183b161c97a6adccff21e8fe132219324635b001eb2cfdf672e"}, @sadb_spirange={0x2, 0x10, 0x4d2, 0x4d4}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d3}]}, 0xf0}}, 0x8000) 20:19:47 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RREAD(r1, &(0x7f0000000680)={0x93, 0x75, 0x1, {0x88, "ace7643f842935337d2b0e3852b4f887454fe03d80d845232cd06a3f8806d45bac3df17e1c775ce412750138d27192a76a8fdb36c3c0d0475a6f44f345107550b10771355a8ceaa301e29f8f1c0635f93d80f9b51371d02d8450c3c5c93ea1705997c5691b9750e63100ce8281155bbe33dfb5e83d8462434373f04beaaf227b483f38f909e68cb4"}}, 0x93) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendto(r2, &(0x7f0000000500)="6b0398f92906656aab007315fb3df36c966c6278519ca6cb5f6fbe00b0c95a6191842c14803ae06cd1df5565e12b", 0x2e, 0x4040000, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) setpriority(0x0, r0, 0x10000) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$full(0xffffffffffffff9c, 0x0, 0x807, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0xe24}]}, 0x14, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x8, 0xe40, 0x8, 0x1000, 0x20, 0x7fff, 0x3, 0x2}, &(0x7f0000000280)={0x4, 0x93, 0x2, 0xffffffffffffffff, 0x8, 0xfff, 0x65, 0x8}, &(0x7f00000002c0)={0xfffffffffffffff8, 0x400, 0x9, 0x3, 0x5, 0xfe51, 0x1f7, 0xffffffffffffff5e}, &(0x7f0000000380), &(0x7f0000000540)={&(0x7f00000003c0)={0x4}, 0x8}) sendmsg$unix(r3, &(0x7f0000000440)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x40000c0}, 0x80) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) setuid(r4) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000004c0)='/\x00', 0x0, &(0x7f0000000400)='security.capa%ility\x00', &(0x7f0000000080)='security.capability\x00'], &(0x7f0000000800)=[&(0x7f00000000c0)='L+', &(0x7f0000000100)=')security]vmnet1#eth1bdevsecuritylo+@*vmnet1\xf9-em1.vmnet0GPLmd5sum\x00', &(0x7f0000000780)='mime_type\xedem1security(system$trustedselfkeyringvboxnet1wlan1:@mime_type\x00', 0x0, &(0x7f0000000580)='L+']) fsetxattr$security_smack_transmute(r2, &(0x7f0000000940)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000980)='TRUE', 0x4, 0x2) ioctl$BINDER_SET_MAX_THREADS(r3, 0x40046205, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x2) [ 1261.246547] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1261.350274] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. 20:19:47 executing program 3: r0 = socket$inet(0x10, 0xfffffffffffffffe, 0x4) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001200)="24000000110007031dfffd946f610500000000000500000000000000421baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1261.557514] selinux_nlmsg_perm: 6 callbacks suppressed [ 1261.557524] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=154 sclass=netlink_xfrm_socket pig=28198 comm=syz-executor.2 20:19:47 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002640)='./file0\x00', 0x0, 0x11) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000a40)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) getcwd(0x0, 0xc6) recvmmsg(0xffffffffffffff9c, &(0x7f0000002380)=[{{&(0x7f0000000000)=@ax25={{0x3, @rose}, [@default, @bcast, @remote, @default, @rose, @rose, @rose]}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/240, 0xf0}], 0x1, &(0x7f00000001c0)=""/214, 0xd6}, 0x2}, {{&(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000340)=""/81, 0x51}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/79, 0x4f}, {&(0x7f0000001440)=""/218, 0xda}, {&(0x7f0000001540)=""/26, 0x1a}, {&(0x7f0000001580)=""/125, 0x7d}, {&(0x7f0000001600)=""/128, 0x80}, {&(0x7f0000001680)=""/55, 0x37}], 0x8, &(0x7f0000001740)=""/218, 0xda}, 0x4}, {{&(0x7f0000001840)=@generic, 0x80, &(0x7f0000001b40)=[{&(0x7f00000018c0)=""/107, 0x6b}, {&(0x7f0000001940)=""/225, 0xe1}, {&(0x7f0000001a40)=""/227, 0xe3}], 0x3, &(0x7f0000001b80)=""/58, 0x3a}}, {{&(0x7f0000001bc0)=@generic, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001c40)=""/207, 0xcf}], 0x1, &(0x7f0000001d80)=""/144, 0x90}, 0x4}, {{&(0x7f0000001e40)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000001ec0)=""/189, 0xbd}, {&(0x7f0000001f80)=""/174, 0xae}, {&(0x7f0000002040)=""/145, 0x91}, {&(0x7f0000002100)=""/10, 0xa}, {&(0x7f0000002140)=""/236, 0xec}, {&(0x7f0000002240)=""/106, 0x6a}], 0x6, &(0x7f0000002340)=""/9, 0x9}, 0x1000}], 0x5, 0x40000020, &(0x7f00000024c0)={0x0, 0x1c9c380}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000002580)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000002600)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xd421, 0x0, 0x3}, r3, 0xffffffffffffffff, r2, 0x0) mkdir(&(0x7f0000002540)='./file0/file0\x00', 0x2) gettid() pipe2(&(0x7f0000002500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4803) ioctl$RTC_UIE_ON(r4, 0x7003) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)="22ae1b179ca83213139df0a560aec0fefdca1065f628ab5361a9aec44b8c8a172ddfc83315cb861e79375ee3f02bfec935174b9b621a845c985b11f239b0afb0d7f9108013d5110d667ba02ca03899350d5f527b25fad799ab3700c3f54dc8ac0b8a662f2fa4e6f32884f41c83e1d2abffd31f4be07f8f2b95db133c8e754e8b00776ce4cebacdc30800549098b0ab52d805e5577021ebcd8dbd0d024adb773a8cf2efd12971274a53b449dced2550c89ea29ef9cc775e395e349045b9349423309e6ee7ff6202f677fa01847b2a3834838e028ce3d53283665d4f19435690894a29a18bfc4415c478a2e2a79823", 0xee}], 0x1}, 0x0) r6 = socket$inet(0x10, 0x3, 0x0) r7 = accept$packet(r5, 0x0, &(0x7f00000025c0)) fcntl$setpipe(r7, 0x407, 0x7ffc) gettid() add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="06780c5e74569d0886fa4e5c809cbd", 0xf, 0xffffffffffffffff) ioctl$sock_ifreq(r6, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x2}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f00000003c0)={0x100000001, 0xffffffff, 0xdd4, 0x4}, 0x10) [ 1261.662900] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=154 sclass=netlink_xfrm_socket pig=28202 comm=syz-executor.2 20:19:47 executing program 2: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000300)={0x80000006}) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x100, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)) epoll_wait(r0, &(0x7f00000001c0)=[{}, {}], 0x2, 0x8001) r3 = open(&(0x7f0000000280)='./file0\x00', 0x800, 0x0) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000240)={0x9, 0x5, 0x8}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00') ioctl$ION_IOC_HEAP_QUERY(r5, 0xc0184908, &(0x7f0000000500)={0x34, 0x0, &(0x7f00000004c0)}) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, r6, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x10000}]}, 0x48}, 0x1, 0x0, 0x0, 0x94}, 0x4000044) 20:19:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f3188b070") r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) splice(r0, &(0x7f0000000000), r1, &(0x7f0000000100), 0xfffffffffffffffc, 0x8) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={[{@numtail='nonumtail,0'}]}) 20:19:48 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$update(0x2, r1, &(0x7f0000000380)="f2f51c9bf9d42d79a4ba8cb957e269b991c5d283d612ce71244db66a0561b261bd4ed78188a50214b0c7fa3989a94d97dbd2757c8c3a0519a82b3aec08a96aa196368f6cc3949b6ec94b942df1cf067605ed0b3c58bba8083441cf628a6a5ec82ec9dae9ea2a5c92a717c8237054", 0x6e) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xb) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x4, 0x7c, 0x7f, 0x3ff, 0x2, 0x3, 0x7, 0x368, 0x40, 0x38e, 0xb94, 0x4, 0x38, 0x2, 0x81, 0x2, 0x8}, [{0x7, 0x14, 0xd2e4, 0x200, 0x6, 0x0, 0x5, 0x7}, {0x7, 0x8, 0x1, 0x2, 0x3, 0x1, 0x8, 0x91ad}], "bb678a30582e0dbf4a966c", [[], []]}, 0x2bb) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 20:19:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000003000/0x9000)=nil, 0x9000, 0xfffffffffffffffd, 0x1, 0x0) 20:19:48 executing program 4: connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000400)={{0xcc, 0xa00, 0x2, 0x211, 0x3a1, 0x0, 0x2e8, 0x12158000000000}, "42d1f5fdd82ce6aa9a3cbbc7de1531b9d233391f24b425713f76760f9d067501eaefd9d8035cd82054029bf34b3cba6fc501f17f0cb9c7cb71048f6d9284a1cb1e771ff0d803287e314138cd", [[], []]}, 0x26c) clock_gettime(0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r1) sendmsg$netlink(r4, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={0x10}], 0x10}, 0x0) recvmmsg(r2, &(0x7f0000000b80)=[{{0x0, 0x0, &(0x7f0000000a40)}}], 0x1, 0x62, 0x0) 20:19:48 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x108000, 0x0) poll(0x0, 0x0, 0x84d8) mlockall(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)=0x1) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) fstat(0xffffffffffffff9c, &(0x7f00000008c0)) lstat(0x0, &(0x7f0000000b40)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) unshare(0x2000400) munlockall() rmdir(&(0x7f0000000580)='./file0\x00') 20:19:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3, 0x7, 0x0, 0x1, 0x2}]}, &(0x7f0000000040)='syzkaller\x00', 0x80, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_matches\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@broadcast, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) 20:19:50 executing program 0: 20:19:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000300)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x20002000007) listxattr(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socket$packet(0x11, 0x200002000000003, 0x300) getrlimit(0xc, &(0x7f0000000000)) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000140)="2610c8249443a943f9645c293a576f7448d66e53264ec68388c65342c5bee66b854aee280e108e5290dcf30fc9f79766aa31261d21f0c33148078732dcf2c7f6f78b44", 0x43, 0xfffffffffffffffb) keyctl$setperm(0x5, r3, 0x2000) getrlimit(0xffffffffffffffff, 0x0) 20:19:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) getsockopt$inet_buf(r0, 0x0, 0x27, &(0x7f0000000380)=""/153, 0x0) gettid() r3 = getpgrp(0x0) timer_create(0x80010007, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x80000000000}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r4 = inotify_init1(0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1808100}, 0xc, 0x0}, 0x40800) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) write$P9_RLOPEN(r1, &(0x7f00000000c0)={0x18, 0xd, 0x1}, 0x18) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x1f, &(0x7f0000000100)=0x100000001, 0x4) 20:19:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') preadv(r0, &(0x7f00000017c0), 0x1be, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0x40, 0x8000, 0x3, 0x7, 0x1, 0x7}) 20:19:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) 20:19:50 executing program 5: 20:19:50 executing program 3: 20:19:50 executing program 1: 20:19:50 executing program 2: 20:19:50 executing program 4: 20:19:50 executing program 0: [ 1264.608166] kauditd_printk_skb: 209 callbacks suppressed [ 1264.608173] audit: type=1400 audit(1554668390.805:52647): avc: denied { map } for pid=28275 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:50 executing program 5: [ 1264.730069] audit: type=1400 audit(1554668390.805:52648): avc: denied { map } for pid=28275 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:51 executing program 1: [ 1264.817848] audit: type=1400 audit(1554668390.845:52649): avc: denied { map } for pid=28275 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:51 executing program 4: 20:19:51 executing program 3: 20:19:51 executing program 2: [ 1264.975851] audit: type=1400 audit(1554668390.865:52650): avc: denied { map } for pid=28275 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:51 executing program 0: [ 1265.120160] audit: type=1400 audit(1554668390.865:52651): avc: denied { map } for pid=28275 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:51 executing program 1: [ 1265.225503] audit: type=1400 audit(1554668390.895:52652): avc: denied { map } for pid=28275 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:51 executing program 2: 20:19:51 executing program 5: 20:19:51 executing program 4: [ 1265.392754] audit: type=1400 audit(1554668390.905:52653): avc: denied { map } for pid=28275 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:51 executing program 3: 20:19:51 executing program 0: [ 1265.540221] audit: type=1400 audit(1554668390.935:52654): avc: denied { map } for pid=28275 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:51 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x6) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) [ 1265.690917] audit: type=1400 audit(1554668390.935:52655): avc: denied { map } for pid=28275 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:52 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioprio_get$pid(0x1, 0xffffffffffffffff) 20:19:52 executing program 0: r0 = socket(0x200000000000013, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00\x00\xd6\x00'}) geteuid() bind$packet(r0, &(0x7f0000000000)={0x11, 0xff, r1, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'sit0\x00\x00\xff\xff\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000180)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) setuid(r3) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="e1", 0x1}], 0x1) [ 1265.812920] audit: type=1400 audit(1554668391.005:52656): avc: denied { map } for pid=28275 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:52 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x92dc134184c1a5e6, 0x4) syz_execute_func(&(0x7f0000000240)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5c9e1ccaba39ddf4507e50c420fae9972b571112d02") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x3) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x125, 0x4) 20:19:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xfffffffffffffff7}) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x519) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) connect(r2, &(0x7f0000000200)=@ethernet={0x1, @remote}, 0xfe50) 20:19:52 executing program 3: pipe2(&(0x7f0000000580)={0xffffffffffffffff}, 0x800) recvmmsg(r0, &(0x7f0000002b00)=[{{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000002080)=""/52, 0x34}, {&(0x7f0000002a80)=""/45, 0x2d}], 0x2, &(0x7f0000003440)=""/4096, 0x1000}, 0x2}], 0x1, 0x40, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)={0x80000000}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4008}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r3, 0xaa1c037d6765f3fc, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc98}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffffe1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000100)="f4", 0x1) setsockopt$sock_int(r5, 0x1, 0x2a, &(0x7f00000001c0)=0x1, 0x4) recvmmsg(r5, &(0x7f0000002bc0)=[{{0x0, 0x52, 0x0}}], 0x1, 0x2, 0x0) recvmmsg(r5, &(0x7f0000003240)=[{{&(0x7f0000000140)=@nl=@proc, 0x80, &(0x7f0000000200)=[{&(0x7f0000000340)=""/154, 0x9a}], 0x1, &(0x7f0000000400)=""/229, 0xe5}, 0x100}, {{&(0x7f0000000500)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000000240)=[{&(0x7f00000005c0)=""/134, 0x86}, {&(0x7f0000000680)=""/165, 0xa5}, {&(0x7f0000000740)=""/107, 0x6b}, {&(0x7f00000007c0)=""/237, 0xed}], 0x4}, 0x2}, {{&(0x7f00000008c0)=@isdn, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000940)=""/205, 0xcd}, {&(0x7f0000000a40)=""/34, 0x22}, {&(0x7f0000000a80)=""/232, 0xe8}], 0x3, &(0x7f0000000bc0)=""/120, 0x78}, 0x3ff}, {{&(0x7f0000000c40)=@pptp, 0x80, &(0x7f0000002000)=[{&(0x7f0000000cc0)=""/183, 0xb7}, {&(0x7f0000000d80)=""/115, 0x73}, {&(0x7f0000000e00)=""/4096, 0x1000}, {&(0x7f0000001e00)=""/244, 0xf4}, {&(0x7f0000001f00)=""/33, 0x21}, {&(0x7f0000001f40)=""/124, 0x7c}, {&(0x7f0000001fc0)=""/16, 0x10}], 0x7, &(0x7f0000002080)}, 0x100}, {{&(0x7f00000020c0)=@isdn, 0x80, &(0x7f00000021c0)=[{&(0x7f0000002140)=""/107, 0x6b}], 0x1, &(0x7f0000002200)=""/145, 0x91}, 0x5}, {{&(0x7f00000022c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f0000002740)=[{&(0x7f0000002340)=""/167, 0xa7}, {&(0x7f0000002400)=""/109, 0x6d}, {&(0x7f0000002480)=""/139, 0x8b}, {&(0x7f0000002540)=""/251, 0xfb}, {&(0x7f0000002640)=""/193, 0xc1}], 0x5, &(0x7f00000027c0)=""/164, 0xa4}}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000002880)=""/6, 0x6}], 0x1, &(0x7f0000002900)=""/198, 0xc6}, 0x1}, {{&(0x7f0000002b40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f00000031c0)=[{&(0x7f0000002e00)=""/108, 0x6c}, {&(0x7f0000002e80)=""/68, 0x44}, {&(0x7f0000002f00)=""/92, 0x5c}, {&(0x7f0000002f80)=""/23, 0x17}, {&(0x7f0000002fc0)=""/116, 0x74}, {&(0x7f0000003040)=""/187, 0xbb}, {&(0x7f0000003100)=""/59, 0x3b}, {&(0x7f0000003140)=""/90, 0x5a}], 0x8}}], 0x8, 0x0, 0x0) shutdown(r4, 0x1) 20:19:52 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x4) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x48) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040), 0x4) 20:19:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x12, 0x4, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)=@ethtool_stats}) 20:19:52 executing program 2: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x3) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000003c0)="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") sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x4000, 0x0) bind$netlink(r1, &(0x7f0000000580)={0x10, 0x0, 0x25dfdbfb, 0x20}, 0xc) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'veth0_to_bond\x00', 0x400}) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r2 = request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0xfffffffffffffffd) r3 = geteuid() lstat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r2, r3, r4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x1910824, 0x0) 20:19:53 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x83, 0x4) getrandom(&(0x7f0000000140)=""/140, 0x8c, 0x2) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={0xfffffffffffffffe}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendto$inet(r1, &(0x7f0000000200)="96", 0x1, 0x3fff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000007a00)={0x0, 0x0, &(0x7f00000079c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000080) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f00000004c0)="88", 0x1, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e20, @loopback}, {0x0, @dev={[], 0x15}}, 0x4, {0x2, 0x4e24, @broadcast}, 'ip6_vti0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) 20:19:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getpgid(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000940)='syscall\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x1}, 0x0, 0x400000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00005b8000/0x3000)=nil, 0x3000) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) mmap(&(0x7f000060b000/0x1000)=nil, 0x1000, 0x5, 0x8000400200000033, r3, 0x0) unshare(0xfffffffffffffffd) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r5) rt_sigprocmask(0x2, &(0x7f0000000240)={0x6}, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@loopback}}, {{@in6=@initdev}}}, &(0x7f0000000500)=0xe8) socketpair(0x2, 0x2000000080003, 0x100, &(0x7f0000000480)) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r6, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2300260109447a0000000000000000660000001400001a0065a455e04ea56d0a47018c8e973bcac914471474a7e0d50a000eadd66d2e49a2ed40dcafa1e046ab6aacc2097d8f75bd9c8b8a220bdde116904efa3f9600f22aa088644f66c2d5baec4079a81bae1927e49e91a4964656d7b227702926af5be846f3de49fad39048633fd9161123894d9427f854a30cb0532c8f31f663380e40ce7f6cb15ec8baab3b7c6f"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x804) r8 = creat(&(0x7f0000000280)='./bus\x00', 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7e) ftruncate(r8, 0x2008200) open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) 20:19:53 executing program 1: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000200)) ptrace$cont(0x20, r0, 0x6, 0xff50) ptrace(0x10, r0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) write$UHID_CREATE(r1, &(0x7f0000000080)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000040)=""/23, 0x17, 0x9, 0x4, 0x6, 0x4, 0x3fffffffc000}, 0x120) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)) 20:19:53 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000f00)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000001300)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000012c0)={&(0x7f0000001280)={0x1c, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x20000814) getdents64(r0, &(0x7f00000001c0)=""/49, 0x31) r3 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400, 0x0) write$P9_RFSYNC(r4, &(0x7f0000000300)={0x7, 0x33, 0x1}, 0x7) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000140)=0x4629c3c759ddd696, 0x4) chroot(&(0x7f0000000180)='./file0\x00') umount2(&(0x7f0000000340)='./file0\x00', 0xa) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', r4}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$LOOP_SET_FD(r4, 0x4c00, r4) recvmmsg(r3, &(0x7f00000010c0)=[{{&(0x7f0000000400)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000480)=""/113, 0x71}, {&(0x7f0000000500)}], 0x2, &(0x7f0000000580)=""/242, 0xf2}, 0x4}, {{&(0x7f0000000680)=@ipx, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000700)=""/252, 0xfc}, {&(0x7f0000000800)=""/173, 0xad}], 0x2, &(0x7f0000000900)=""/237, 0xed}}, {{&(0x7f0000000a00)=@nfc, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a80)=""/125, 0x7d}], 0x1, &(0x7f0000000b40)=""/148, 0x94}, 0x8}, {{&(0x7f0000000c00)=@nfc, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/6, 0x6}, {&(0x7f0000000cc0)=""/137, 0x89}], 0x2}, 0x2}, {{&(0x7f0000000dc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000e40)=""/105, 0x69}], 0x1, &(0x7f0000000f00)}, 0xffffffffffffffcf}, {{0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000000f40)=""/12, 0xc}, {&(0x7f0000000f80)=""/177, 0xb1}], 0x2, &(0x7f0000001080)=""/43, 0x2b}, 0x3fd}], 0x6, 0x10000, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000001240)={@empty, 0x31, r5}) 20:19:53 executing program 5: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) accept4$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14, 0x80000) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x3, 0x9, 0x878, 0x5, 0x10, r0, 0x2, [], r2, r0, 0x9, 0x8}, 0x3c) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) r5 = getpgrp(0x0) r6 = gettid() rt_tgsigqueueinfo(r5, r6, 0xb, &(0x7f0000000100)={0x0, 0x0, 0x2}) read(r4, &(0x7f0000000080)=""/128, 0xae3f1a6) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000240)) fcntl$setlease(r0, 0x400, 0x2) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x80000) setsockopt$inet_mreqn(r0, 0x0, 0xa16e9789db9ad57f, &(0x7f0000000080)={@dev={0xac, 0x14, 0x14, 0x1c}, @empty, r7}, 0xc) [ 1267.855285] EXT4-fs (sda1): re-mounted. Opts: (null) 20:19:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="380000001000010600"/20, @ANYRES32=0x0, @ANYBLOB="0000000012000c000100697036746e6c00000800020004001300"], 0x38}}, 0x0) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/168, 0xa8}, {&(0x7f00000000c0)=""/125, 0x7d}, {&(0x7f0000000240)=""/153, 0x99}, {&(0x7f0000000300)=""/216, 0xd8}, {&(0x7f0000000400)=""/168, 0xa8}], 0x5) 20:19:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) socket(0x4, 0x6, 0xffff) sendmsg$nl_route_sched(r0, &(0x7f0000007140)={0x0, 0x0, &(0x7f0000007100)={&(0x7f00000070c0)=@getqdisc={0x24, 0x26, 0xf05}, 0x24}}, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000040)=""/78) 20:19:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") sync_file_range(r0, 0x3ff, 0x8, 0x1) r1 = creat(0x0, 0xdfd8763e5498d5d8) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r1, 0x0, 0xa74, 0xed, 0x2}) getpeername$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000240)={@rand_addr, 0x0}, &(0x7f0000000280)=0x14) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x200, 0x1, 0xffffffffffffc, 0x1, 0xffffffffffffffff, 0x7, [], r2, r1}, 0xfffffffffffffd02) setsockopt$sock_timeval(r1, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000600)={'TPROXY\x00'}, &(0x7f0000000640)=0x1e) fcntl$setstatus(r3, 0x4, 0x400) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) sync_file_range(r1, 0xffe, 0x6, 0x4) clone(0xa06, &(0x7f00000006c0)="465b374760cc6572464ecf355fee4a868cc8d7f12cf7b22b636fe0cb6bed66cd958a6422375666a20c7082dfee8c3c5b80d0d287e56cdded9567bf3a83752987c668c86eb9456974d540d6e2260bcbf72a470eccfdda5ae27a0c68e756fdb3aea97609b9e3999eae79a08983f7e6812719e64e133e48e4a0438da962b7c5d609bd97d35b05a7056cc4d3c6711e7fa3188c5f49606a08a4f524c8683ae4b0df8006f39afd1aca1c78a824a4ddac787e234302d3b7d8ea0e803ff3f570e82a5126217e3a6d568e1f00b86c7548f6b4d582bd85ea7915a8e427efdc3433ec39b3b5d51781f9c54f1fc5d5e15e946ecc6dab", &(0x7f00000005c0), &(0x7f0000000440), &(0x7f00000007c0)="2e8779a76ef19da9b3d898de4cb60d91277bc8f61830e425b9779aa41a6b291b8157ed8d9c7fa2af3e636f988e723f7ab0a834c92803afcbe4a4f84a71c94bccd70f2a7572284cf39459ab75e5277d6404d1691b25d2fa50ab8676c2d7b924fa5f3c9c9210bc69e8beee44af8d68a67a8456ff02214118afeff60030214ccf84") fsetxattr$security_ima(r1, &(0x7f0000000580)='security.ima\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="0202da9ecc7574fe4077a80d4b6261e7deb0e6000000000000"], 0x12, 0x2) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000100)={0x80000001}) accept4$inet(r1, &(0x7f0000000500)={0x2, 0x0, @loopback}, &(0x7f0000000540)=0x10, 0x800) 20:19:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x100000003, 0x0) socket(0x10, 0x0, 0x8a) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000001cc0), 0x4000052, 0x10102, &(0x7f0000001540)={0x0, r2+10000000}) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0xfea3, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) [ 1268.592116] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 20:19:55 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000400)=ANY=[@ANYBLOB="01c067f1ae48e09944050180c200000086dd601ddcf500101100000000fdffffff000000000000000000fe8000000000000000000000000000aabd0279401000000000000000"], 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) accept4$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x80000) 20:19:55 executing program 0: r0 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400080, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x264f9636b9189c82, 0x2}, 0x14) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000300)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x6) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000280)={0x5}) statx(r1, &(0x7f0000000080)='./file0\x00', 0x4000, 0x7ff, &(0x7f0000000100)) sendmsg$netlink(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000100000001000000255ebde0201862028b1536ef668ba284960ba050160f88bb5d15026aad9b5429828f3a128a8507c0dffa4a2827659390661f6398de99324419beea01b925c30abe51f67aa03d1db7b10f7981a94e4f26973199fb5f9b1510dcdbbad272384553eb2d3a239464e3b743358e7f73be16f3df1eaf70c99b27b206721c0add", @ANYRES32=r5, @ANYBLOB="3403c6f5f905adaa2e72039db421c61eea0590388f5ff3fc3b6b7e07c58da13120c2e469d071793923395e955c6d05c73cf22ce3c765bb96b4edceefaf327e9296c5b5fc654f3cb24c9a68613205197395884c2b2d47876cf747e9ffffff7f000000004cdbb30cf249d7f20c06e95effff05a2aa4c3686698fd5000000"], 0x18}, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f00000002c0)=0x5) recvmmsg(r3, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) socket$inet6(0xa, 0x7, 0x63cafb04) 20:19:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @empty}, {0x0, @dev}, 0x48, {0x2, 0x0, @initdev}, 'bcsf0\x00'}) syncfs(r0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x40200, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000140)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) tee(r1, r1, 0x4f285335, 0x8) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) setsockopt$inet6_buf(r2, 0x29, 0xea, &(0x7f00000002c0)="a3a2a0203020ca40eb91d80fd58be950588e44d2f13b6f3ca0f524bb9967241818922078366f259645d4570a24224d4f89bd49221891be439b7a6d33baeff6d2dec8dd30c1e0cb0d50ac00752c63bf40ab50b52467607b06ffe0ab821d1baf7d74dc1cae9caaadf9edae8a7abad9d298a4e13e46bc6a663cbc1bd37b4c0d287572900f08cd5987188a728998b09e6401773d8ff399ef7463b556edbaa2644be51b2efffc2e80bb22675e6a37fd28fab11632835fab12c32222dc8ea4d9", 0xbd) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(r0, &(0x7f0000000240)={0x14, 0x69, 0x2, {0x22, 0x1}}, 0x14) r3 = inotify_init() getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x2000, 0x0) accept4$inet6(r4, 0x0, 0x0, 0x80000) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x4000082) write$binfmt_elf64(r5, &(0x7f0000004000)=ANY=[@ANYRESOCT=0x0], 0x17) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') unlink(&(0x7f0000000280)='./file0\x00') sendfile(r5, r5, &(0x7f00000001c0), 0xa198) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200)={0xffffffff, 0x3ba, 0x7fffffff, 0x9, 0x4000000000000000}, 0x14) [ 1269.356937] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 20:19:55 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='./file0\x00') mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) lgetxattr(&(0x7f00000002c0)='./file0/bus\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="757365722e6a6f64657616003b7c0b70c88bae5c16bed6a293208dcbf0d9cfcf1f0b2b6d35c495f9e98b00a08d4b55c819afd05d2e225ae23ee1700e1a18c952"], 0x0, 0x0) fcntl$lock(r1, 0x0, 0x0) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r3, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000004000000ab000000b7b78b8e33d48536646976d99a223458d866c8553148ec73d071aff450fc1ca3f7a9cd54c38410a3edfa4f04187d1b5843fcff05f5092c8ecca3f387cd8a07a868aa867bbd39caac1d035bb8757d844ff90cdedf567327d44467977702f2fa1d6dd5b51f0f9003184e3a5411524ae1a665ae8bcfe90cfb2382c3043cf6c0e8ed64b36915b2190228330c8c8aeb22a3fc1056446cb9c5512a5482f5d0c8d6e074f25a2fec40295d5b4b0bd7"], 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) fstat(r2, 0x0) [ 1269.612629] kauditd_printk_skb: 311 callbacks suppressed [ 1269.612639] audit: type=1400 audit(1554668395.815:52968): avc: denied { map } for pid=28393 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1269.725313] audit: type=1400 audit(1554668395.855:52969): avc: denied { create } for pid=28396 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1269.817034] audit: type=1400 audit(1554668395.905:52970): avc: denied { write } for pid=28396 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1269.937543] audit: type=1400 audit(1554668395.935:52971): avc: denied { read } for pid=28387 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1270.028567] audit: type=1400 audit(1554668395.995:52972): avc: denied { create } for pid=28387 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1270.145824] audit: type=1400 audit(1554668395.995:52973): avc: denied { write } for pid=28387 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1270.277891] audit: type=1400 audit(1554668396.025:52974): avc: denied { map } for pid=28402 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1270.363528] audit: type=1400 audit(1554668396.035:52975): avc: denied { map } for pid=28399 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1270.438939] audit: type=1400 audit(1554668396.035:52976): avc: denied { map } for pid=28402 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1270.562345] audit: type=1400 audit(1554668396.035:52977): avc: denied { map } for pid=28399 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:19:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40b734d28783025c}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x800, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000040000c20000"], 0x8) connect$inet6(r1, &(0x7f00000000c0), 0x1c) sendmmsg(r1, &(0x7f0000000440), 0x400000000000211, 0x810) 20:19:57 executing program 0: rt_sigaction(0x1, 0x0, &(0x7f00000004c0)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000500)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$setstatus(r0, 0x4, 0x2000) 20:19:57 executing program 3: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x40000104001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x1, 0x0, 0x0, 0xf7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) sched_getattr(r0, &(0x7f0000000000), 0x30, 0x0) 20:19:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'ip6_vti0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfffffffffffffd82, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4000000014000905000000000000000078c6c239162bd5d1af1a02000000", @ANYRES32=r2, @ANYBLOB="140015c27e5bede615ee61702710635c7a06000000000000000000000000000000000014000200fe8000000000000000000000000000aa626b59a904c0f6412f6efec10eff01d8d708fb2bd51e5ec4e91038b903d9bcd122361fa040fed353a660503d8bfc56e588834c14b2061a6e80000000857d2e7a6edf1d2f8d1d5a5e720f2c7e2779cdec0fb6ec42b584a225745c871598dd9276ddf09439a7b76cd7c9df"], 0x40}}, 0x0) 20:19:57 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @local}, 0xc) pause() bind$inet(r0, &(0x7f000021d000)={0x2, 0x4e21}, 0x3e) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @local, @remote}, 0xc) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x1c}, @multicast1}, 0x8) syz_emit_ethernet(0x2a, &(0x7f0000359fd5)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 20:19:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) sendto$packet(r0, &(0x7f0000000140)="d066257eebfcb49b59e23993135a00544702eccc31d515071ad069ff5bcaea5bb0fe69ee1c1dd2ca21a26e9d6cfa8725542bfd6785de5b491b95593f0c5cd749c3c6c93117f266409a0f52e8af161846c9bd1f24feb404179fc1df7f6a5bf601ff6f3bc201b0934c22374703e726d5", 0x0, 0x40, 0x0, 0x2a0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x1c) 20:19:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0x0, 0x92, &(0x7f0000000040), &(0x7f0000000080)=""/146, 0x1}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6}]}, 0x10) close(r2) 20:19:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x300, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x800, 0x3) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000), 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f0000000440), 0x400000000000211, 0x810) 20:19:57 executing program 3: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCNXCL(r1, 0x540d) fcntl$lock(r0, 0x7, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3fc}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4003}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 20:19:58 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket(0xb, 0x0, 0x91ec) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000040)={'broute\x00', 0x0, 0x4, 0xd7, [], 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000140)=""/215}, &(0x7f00000000c0)=0x78) 20:19:58 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000001c0)=0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00'}, 0x10) write$selinux_create(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, 0x0) sendmmsg(r0, 0x0, 0x0, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, 0x0, 0x50000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000a40)) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'sit0\x00', @ifru_flags=0x3100}}) clock_adjtime(0x1, &(0x7f0000000680)={0x400, 0x0, 0x200, 0x0, 0x1000, 0x0, 0x80000000, 0x4, 0x4, 0x7, 0xfee4, 0x400, 0xa8, 0x3, 0x0, 0x3, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0xb05, 0x8, 0x1, 0xa46, 0x7, 0x382c}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000400)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="040000000066e7dbdf25062564ec77000197a3169dd6076047000c0007000a000000090000e7ebefea45621280f149bb31080004004e20000008000100c42c00cbe45f6ed3655a87622dc90daf8869000800040000"], 0x4c}, 0x1, 0x0, 0x0, 0xc000}, 0x40) setxattr$security_capability(&(0x7f0000000a80)='./file0/file0\x00', 0x0, &(0x7f0000000800)=@v3={0x3000000, [{0x1, 0x5}, {0xfffffffffffffffe}]}, 0x18, 0x3) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000780)={'nat\x00'}, &(0x7f0000000000)=0x185) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000340)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x802, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@multicast2, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000240), &(0x7f00000003c0)=0x14) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r3, 0xfffffd6f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1e, 0x8031, r2, 0x0) mprotect(&(0x7f00003a3000/0x3000)=nil, 0x3000, 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) pipe2(0x0, 0x4000) 20:19:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x48, &(0x7f0000b67000), &(0x7f0000000040)=0x4) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x802) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) socket$inet6(0xa, 0x3, 0x84) 20:19:58 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000180)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="180978b77600"/19], &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) chdir(&(0x7f0000000340)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) setfsuid(r2) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400440, 0x0) setreuid(r2, r1) getsockopt$inet_tcp_int(r3, 0x6, 0x3f, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000180)={0x400, 0x0, 0x3}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) write$P9_RGETATTR(r3, &(0x7f0000000240)={0xa0, 0x19, 0x2, {0x0, {0x61, 0x2, 0x3}, 0x41, r0, r5, 0x8, 0x2, 0x400, 0xfff, 0x62da476, 0xc69e, 0x1, 0xffffffff, 0xffffffff00000001, 0x7f, 0x1ff, 0x2, 0x3f, 0x0, 0x7}}, 0xa0) symlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x40001, 0x0) ioctl(r6, 0x0, &(0x7f00000003c0)="17bfad5e543cedce2362a7f0bd13e959c256928ab9ae6ebbd58ff40848907c8254c5ee4ae547a8b366de291224a680ebd447e15e257af51dee876bb6b730db9a5cb9dcc0531337251c5898a72d5c97a8c45df9d361a98b35df313b3b9ced7354eb") ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000440)={0x7fffffff, 0x3, 0x7}) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@rand_addr="196f1fc508c5af81ea7c369e76c25934", @in6=@rand_addr="32a36458835a2dd2efb06ffcfe19e452", 0x4e20, 0x7, 0x4e20, 0x8000000000000, 0x2, 0xa0, 0x20, 0x4, 0x0, r4}, {0x3, 0x9c, 0x1000, 0x8, 0x6, 0x8, 0x1, 0x7}, {0x3, 0x4, 0x5, 0xfffffffffffffffb}, 0x7fff, 0x6e6bb5, 0x1, 0x0, 0x2, 0x3}, {{@in6=@rand_addr="6465604a5b4815fa8ee80ace3b334145", 0x4d3, 0x3b}, 0x2, @in=@rand_addr=0x100, 0x3504, 0x7, 0x0, 0x6, 0x20, 0x7, 0x7}}, 0xe8) write$selinux_user(r6, &(0x7f0000000580)={'system_u:object_r:auditd_initrc_exec_t:s0', 0x20, 'unconfined_u\x00'}, 0x37) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000600)='nbd\x00') sendmsg$NBD_CMD_STATUS(r3, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x14}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, r7, 0x702, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r3}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40005) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r6, 0x0, 0x20, &(0x7f0000000740)={@rand_addr, @dev, 0x0}, &(0x7f0000000780)=0xc) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f00000007c0)=0x3) futimesat(r3, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) bind$inet(r6, &(0x7f0000000880)={0x2, 0x4e22, @loopback}, 0x10) r9 = socket$inet6(0xa, 0xa, 0x8) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000001240)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000001200)={&(0x7f0000000940)={0x8c0, r10, 0x1, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r8}, {0x180, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xe00000}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r8}, {0x12c, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r8}, {0x4}}, {{0x8, 0x1, r8}, {0xbc, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xe1}}, {0x8}}}]}}, {{0x8, 0x1, r8}, {0x100, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x606f}}, {0x8}}}]}}, {{0x8, 0x1, r8}, {0xf8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r8}, {0x220, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xd8c}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x26e}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r8}, {0xe8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x8c0}, 0x1, 0x0, 0x0, 0x4001}, 0x40) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001280)) mkdir(&(0x7f00000012c0)='./file0\x00', 0x100) prctl$PR_GET_FP_MODE(0x2e) setsockopt$inet_tcp_int(r9, 0x6, 0x1b, &(0x7f0000001300)=0x100000000, 0x4) getsockopt$IP_VS_SO_GET_VERSION(r6, 0x0, 0x480, &(0x7f0000001340), &(0x7f0000001380)=0x40) listen(r6, 0x8) 20:19:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000000180)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffffad}}, &(0x7f0000000480)='GPL\x00\x83\xff\x13\x0f_\xb0\x0e][d\x9b\x18r\xd22CT\xb6\xe2wp\xc5\xa6$\x1e\x8d\xef\xd6S>*\xe1&\xbee\\l\x12cI!l0\xbb\x1f\x80\xfb7\x0e\xc0\xd5\xbe\xe7\x82\xafW\x8d\f<\xc1\x8d\x1e\x8b=+6\xfb\xf4\xe4\xba\xb3\xff\xf4\xcb\x94\xb8N\x91j\xc4\x85F\xd3I\xb7\xbb\xf3\x9a\xf2\r\a*\xd1\x9c\x1d\xe0\xdet+\xad\x10\xb2\xba\xb4\x8fa\x96\xe5-o\xec\x94\x17\x98\xceKF5\xb1\xd1\x1ct\xac\x89j\xa0\xb6\xc3>\xb1U$\xeaC\'\xd2\x98\xd1\xb6(\xba\x00B\xa0\xbc,\xaaI\xb9\xe2`QD\xe7\xbcWX\xb5\x89\x8a\ne\x85\xad\xd0\xd0\x1d\x96\x9a\xf9\xc1\xa5\x9b\x9ce %\xd4\xf1U\x03[\xf4\x92\x8d\xaf\xfe\xd3\xdf\x92>\x81\xdf\xd9\xf74\x1ajS\xfc\x1dn\x02\xad~\xdc\xbea\x02C\x1d\n\x04\x049\xda$\t\x8c\xa2\x9f\xf6\r\x9e\xacp\xd2\x8d~\xa4\x97\x88>\xfdW\xf3U\x96\xd9\x18t\xb2\xfd\xee<\x965\x94n\xbc\b\xc9.\xd6\x94ov\x8e\xaf\x05l\xbc\xa6,\x1c\xa59Q\xa9~\xfc\xa7\x1e\xb53\x9aH\xb4\aqh]m\xb6,\xe3\xc52|J\')7\x10n4\xb3;/N\xf6/\x1c\x1c\x87b\xc1\x89\xf4\xc8{\xe8Ab\xe2\x8e\t\v\xe5\xf6\xfcnQ\v?\xaf\xf2\xd9\xc0\x9d<\b\xd4\xf6\xa1\xe0$\xca\xe6\xffX\xe4\xc3\x1c\x03\x93\xf6X\xb7\xad}\x83\xf7\x1a=\xb0\xe3\xc6', 0x400000000001, 0x99, &(0x7f0000000600)=""/153, 0x0, 0x4, [], 0x0, 0x40000, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080)={0xfffffffffffffffc, 0x0, 0x100}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="619aff070000000001000000ea81", 0x0, 0x8203}, 0x2fd) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) bind$packet(r1, &(0x7f0000000280)={0x11, 0x3a6848dd8533b321, r2, 0x1, 0x5, 0x6, @dev={[], 0x29}}, 0x14) 20:19:59 executing program 3: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x5, 0x40) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40800, 0x2) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000080)={{0x2, 0x3, 0x2, 0x2, 0x7}, 0x5, 0x8bb4}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000100)) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xfc, 0x5, 0x1, "4041086b483f0ffffbbe891a617252ce", "79bad37fbe92da9be1ea04d51a2492b46fffc391a9e4c43d18c7d867f7d9b528c28d2f5dcb43322d87f5c519adb4baa3d3cb5b1395962b659e74440154d61bb6f76555685498f01c554d45ba9f85d59e186cf2574af81d9a3e98311cb6e4641c40055d631bee91e5161b8b69da581b037bbfb5bfe9651b880b47120e4ead9bcbb4107b356a142c52f10ab252d33ae2730127b15d579d5f1d5ebde8630944c190652db600505ce50c025ef9bb16b3a3d56af273287de4473173cb3fcfd4ac1541e63c233a9b484d60206b04f45abba2dd087ec6f945466079e273939a92aa0d07fd54df0f5b3514"}, 0xfc, 0x1) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x2, 0x7, 0x3, 0x7, 0x0, 0x80000, 0x4202, 0x1, 0x6, 0x75, 0x7, 0x1ff, 0x7, 0xfff, 0x0, 0x20, 0x3, 0x0, 0x80000000, 0x0, 0x5, 0x81, 0x80, 0x80000001, 0x7fffffff, 0x1, 0x7, 0x9, 0x2, 0x3, 0xffffffffffffff80, 0xfffffffffffffbff, 0x7, 0x9, 0x6, 0x7f, 0x0, 0x7, 0x3, @perf_config_ext={0x10000, 0x4}, 0x4, 0x1, 0x9, 0x7, 0x4, 0x1ff, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x28, &(0x7f0000000340)}, 0x10) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000003c0)={0x0, r0, 0x7fffffff, 0x7fbf, 0x8, 0x3c0c}) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000400)={@rand_addr, @local, 0x0}, &(0x7f0000000440)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000480)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x76, r4}) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) utimensat(r1, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)={{r5, r6/1000+10000}}, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xe2) ptrace$getregs(0xe, r3, 0x8001, &(0x7f0000000580)=""/94) getdents64(r1, &(0x7f0000000600)=""/22, 0x16) r7 = geteuid() sendmsg$nl_xfrm(r2, &(0x7f0000000880)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x10001000}, 0xc, &(0x7f0000000840)={&(0x7f0000000680)=@getpolicy={0x1b0, 0x15, 0x300, 0x70bd2d, 0x25dfdbff, {{@in6=@mcast1, @in=@loopback, 0x4e22, 0x6, 0x4e22, 0x9, 0x2, 0x20, 0x20, 0x29, r4, r7}, 0x6e6bb3, 0x2}, [@algo_auth={0x5c, 0x1, {{'sha384-ce\x00'}, 0x88, "344f207377c9efd1eff3f507bc961f54c4"}}, @algo_comp={0x104, 0x3, {{'lzjh\x00'}, 0x5e0, "45dc2db175542663b3d6889a04372a9b2a471553e0c15ef02245270748152b5c442355aa55f42b48f872168220580737f08d220aad0c908e4f282f6c64e4dffe1cb41acd7360f07095fff235ab98b5d7d952db04c4360e5afc1f2b46326c871ba3bec8c6fb4d7363d97331e0c2744f36c1ba18d4baf8e7ca8424f5eeb765a47c257594b7ccc85a20435d46b43f9f940300f779d3a6952c9578f3ab3724804f487f6e7f220d291d08a9efe0feb3961812c04f28327c7e52ac2d0a3a6d"}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) openat$random(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/urandom\x00', 0x100, 0x0) r8 = syz_open_procfs(r3, &(0x7f0000000900)='net/ip6_mr_cache\x00') ioctl$RNDADDENTROPY(r8, 0x40085203, &(0x7f0000000940)={0xe63, 0x40, "4802bba185e3bf543a4f74b3752613b175f98129b43b67e96423127f49099cfa8924bed725444964177aeca55cf4c976ed2c4eb68c73d6396778e2c6708cf5ba"}) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@empty, @in6=@dev={0xfe, 0x80, [], 0x1b}, 0x4e24, 0x1, 0x4e22, 0x0, 0xa, 0x0, 0x20, 0x62, 0x0, r7}, {0x7, 0x0, 0x2, 0x4, 0x7, 0x8, 0x20, 0x5}, {0x7, 0xec, 0xfffffffffffff0c9, 0x3}, 0x80000001, 0x6e6bb7, 0x2, 0x1, 0x0, 0x3}, {{@in6=@loopback, 0x4d2, 0xff}, 0xa, @in=@loopback, 0x0, 0x3, 0x3, 0x81, 0x5, 0x3f, 0xfff}}, 0xe8) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000ac0)) chmod(&(0x7f0000000b00)='./file0\x00', 0xc) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000b40)={0x2, {{0xa, 0x4e20, 0x101, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000001}}}, 0x88) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000c00), &(0x7f0000000c40)=0x14) setxattr$security_evm(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)='security.evm\x00', &(0x7f0000000d00)=@v2={0x7, 0x1, 0xd, 0xfff, 0x92, "09ceee09d0aeaca75625a8e90b5d5eb1897ad3043852e4e8e23443d8f7a9d76f9f03125145d2a91833af21aca94826fd770e3877da9fa302b3af0ded1b33ac869bafd484d95eb9367592ce4cffbc29da7eab2002cea5acb904284106df7bc57e075298dc37c8ec70a42a94d219de6c82fd1fb2b934bcc3497fa6b354cea27a35c6ad540241dca190e48a609fb5b341e186e7"}, 0x9c, 0x3) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x16, &(0x7f0000000dc0)=[@sack_perm], 0x1) 20:19:59 executing program 4: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) bind$inet6(r3, &(0x7f00000002c0)={0xa, 0x4e22, 0x1, @mcast2, 0x380}, 0x1c) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000) sendto$inet6(r2, 0x0, 0x0, 0x24000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f00000000c0)={r4, r5/1000+30000}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000499093b2200000000005d1e4e6500"/28]) r6 = socket$packet(0x11, 0x2, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000240)={0x3, 0x1, 0xffffffff}) getsockopt$inet6_tcp_buf(r3, 0x6, 0xb, &(0x7f0000000300)=""/100, &(0x7f0000000380)=0x64) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7, 0x4}, 0x4) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000000)) r8 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r8, 0x10099b7) sendfile(r2, r8, 0x0, 0x88000fbfffffc) connect$unix(r3, &(0x7f0000000100)=@abs, 0x6e) 20:20:00 executing program 2: clock_gettime(0x7, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0xc) r2 = socket$inet(0x10, 0x2, 0x0) dup2(r1, r2) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010407051dfffd946fa283000c201e0009000100031d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 20:20:00 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0)=0x3, 0x4) timer_create(0x0, 0x0, 0x0) times(&(0x7f0000000200)) r1 = fcntl$dupfd(r0, 0x406, r0) timer_create(0x0, 0x0, 0x0) timer_create(0x2, &(0x7f0000000480)={0x0, 0x41}, &(0x7f00000004c0)) timer_create(0x5, &(0x7f0000000180)={0x0, 0x8, 0x1}, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) capset(&(0x7f0000000280)={0x20080522, r2}, &(0x7f0000000600)={0x9, 0x7, 0x0, 0x2, 0x3, 0x1000}) timer_create(0x5, &(0x7f0000000040)={0x0, 0x32, 0x4}, &(0x7f0000000240)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000540)=0x0) timer_create(0x7, &(0x7f0000000580)={0x0, 0x33, 0x0, @tid=r3}, &(0x7f00000005c0)) timer_create(0x5, &(0x7f0000000100)={0x0, 0x19, 0x6, @tid=0xffffffffffffffff}, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000300)={0x0, 0x31, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000340)=0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000003c0)={'HL\x00'}, &(0x7f0000000500)=0x1e) timer_delete(r4) r5 = syz_open_procfs(0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f0000000380)="ddbed734aa23e79276de8159a1fca80a", 0x10) ioctl$TIOCGSID(r1, 0x5429, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r6, &(0x7f0000000080), 0x80000003) 20:20:00 executing program 0: perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) 20:20:00 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f000060b000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) close(0xffffffffffffffff) socketpair(0x2, 0x2000000080003, 0x100, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000bc0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000006c0)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x200000) symlinkat(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) ftruncate(r2, 0x2008200) open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) creat(&(0x7f0000000680)='./bus\x00', 0x0) 20:20:00 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='proc\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'va\xf9\x01\xe2\xff\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) 20:20:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) wait4(r0, &(0x7f0000000640), 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x1) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400000, 0x0) getdents(r1, &(0x7f0000002840)=""/188, 0xbc) r2 = accept$unix(0xffffffffffffff9c, &(0x7f0000002900)=@abs, 0x0) splice(0xffffffffffffffff, &(0x7f0000000400), r2, &(0x7f0000002640), 0xb33, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x40, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/policy\x00', 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x8f}}, 0x4000001) ioctl$PPPIOCGUNIT(r4, 0x80047456, &(0x7f0000000500)) mkdirat(r4, 0x0, 0x40) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f0000000100)) ioctl$PIO_CMAP(r4, 0x4b71, &(0x7f0000000240)={0xffffffff, 0x1, 0x1, 0x3, 0xfffffffffffffffe}) ptrace(0x10, r6) syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r4, 0x0, 0x20000000) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000500)=ANY=[]) wait4(r6, &(0x7f00000003c0), 0x200000000000, &(0x7f0000000300)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r4, 0xc0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0}}, 0x10) ptrace$pokeuser(0x6, r6, 0x388, 0xffffffffffffffff) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f00000000c0)={0xffffffff, 0x1, 0x6, 0x8, 0x10001, 0x100000001}) 20:20:00 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000180)=0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) sendmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000040)="240000005a0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 1274.625317] kauditd_printk_skb: 386 callbacks suppressed [ 1274.625325] audit: type=1400 audit(1554668400.825:53364): avc: denied { map } for pid=28541 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1274.718802] audit: type=1400 audit(1554668400.885:53365): avc: denied { map } for pid=28541 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1274.769977] audit: type=1400 audit(1554668400.905:53366): avc: denied { map } for pid=28541 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:01 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast2, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f0000000280)="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", 0x566, 0xc001, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20001, 0x0) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfd}, 0xc) sendto$inet6(r0, &(0x7f0000000000)="f11d9485945530b02c13b63ecca90bcd5e45aae6c27dcfb60d8f3b82d09721908ec5fd0cd4fc40b461afc79758bb2ebb7ba7e67fc49a3d4bb896b2", 0x3b, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000900)="c5cbdeda579d85f4a014ee69", 0xc, 0x0, 0x0, 0x0) [ 1274.880346] audit: type=1400 audit(1554668400.905:53367): avc: denied { map } for pid=28541 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1274.965140] audit: type=1400 audit(1554668400.915:53368): avc: denied { map } for pid=28541 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1275.062026] audit: type=1400 audit(1554668400.915:53369): avc: denied { map } for pid=28541 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1275.144716] audit: type=1400 audit(1554668401.055:53370): avc: denied { map } for pid=28549 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1275.151426] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1275.220996] audit: type=1400 audit(1554668401.055:53371): avc: denied { map } for pid=28549 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1275.305225] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1275.324020] audit: type=1400 audit(1554668401.065:53372): avc: denied { map } for pid=28549 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:01 executing program 0: prctl$PR_CAPBSET_DROP(0x18, 0xd) syz_emit_ethernet(0x7e, &(0x7f0000000200)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x3c7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 20:20:01 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80000, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) [ 1275.424937] audit: type=1400 audit(1554668401.065:53373): avc: denied { map } for pid=28549 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x1f) flock(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x110, 0x4) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x7f) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) prctl$PR_GET_NAME(0x10, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) recvmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=""/233, 0xe9}}], 0x1, 0x0, 0x0) 20:20:02 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f00000000c0)='%\\lo@posix_acl_access-}\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=r0, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000010c6105fba00000000000000000019e6", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) write$P9_RSETATTR(r4, 0x0, 0x0) sendfile(r1, r4, 0x0, 0x800000000024) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) rt_sigsuspend(&(0x7f0000000340), 0x8) creat(&(0x7f0000000200)='./bus\x00', 0x0) 20:20:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x9, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) 20:20:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = socket$inet(0x2, 0x7, 0xf12) recvfrom$inet(r2, &(0x7f0000000000)=""/142, 0x8e, 0x40000000, &(0x7f0000000100)={0x2, 0x4e22, @multicast2}, 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x1f, r1, 0x0, 0x0) exit_group(0x0) 20:20:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, 0x0, 0x15}, 0x3c) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x801, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', r0}, 0x10) accept$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, &(0x7f00000006c0), 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(r3, &(0x7f0000000640)={0x14, 0x69, 0x0, {0x46, 0x1, 0x6}}, 0x14) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd", 0xc8, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0xfffffffffffff801, 0x4560f817, 0x8, 0x25f9a4d2, 0x0, 0x2, 0x0, 0x9, 0x7, 0x6, 0x6, 0xf75, 0x3, 0x6, 0x8, 0x7, 0x1, 0x1a2f, 0x3, 0x3, 0x8, 0x0, 0x8, 0x9, 0xffff, 0x0, 0x7ff, 0x1, 0x3ff, 0x0, 0x7, 0x1, 0x8, 0x0, 0xbc31, 0x3f, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0xe7}, 0x220, 0x8, 0x9, 0x5, 0x20, 0x80}, 0xffffffffffffffff, 0x0, r2, 0x8) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x2d) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, &(0x7f00000000c0)=0xfffffe96) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000200)=0x9) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x37) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0xa000000000000005) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="180000fcff1800000017570800ffffffff9500000000000000a150aa1b000000000000005092b6100927ac21ec88b675d636b6"], &(0x7f0000000080)='syzkaller\x00', 0x1f, 0xfd, &(0x7f00000000c0)=""/253, 0x41f00, 0x1, [], r1, 0x1, r0, 0x8, &(0x7f00000001c0)={0x267, 0x7}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x77c, 0x6, 0x4}, 0x10}, 0x70) [ 1276.466187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=50704 sclass=netlink_route_socket pig=28594 comm=syz-executor.0 [ 1277.201684] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=50704 sclass=netlink_route_socket pig=28607 comm=syz-executor.0 20:20:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0), 0x10) 20:20:03 executing program 4: time(&(0x7f0000000d40)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f00000052c0)={0x2, 0x80004e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x2000000005) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='asymmetric\x00', &(0x7f0000005400)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x2, 0x40) exit(0x80000003) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000005700)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) r5 = accept4$inet(r3, 0xffffffffffffffff, &(0x7f0000000100)=0xffffffffffffff81, 0x4) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000056c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000005840)) accept$packet(r3, &(0x7f0000004dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xfffffffffffffdad) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000005c40)={'team0\x00'}) accept$packet(r3, 0x0, &(0x7f0000005cc0)) sendmsg$TEAM_CMD_OPTIONS_SET(r2, 0x0, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:20:03 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2000400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) listen(r0, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sched_setscheduler(r1, 0x6, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x184, 0x20000003, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) 20:20:03 executing program 1: r0 = socket$inet6(0xa, 0x80000, 0xffffffffffffffff) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e1d, 0x0, @remote}, 0x2) close(r0) 20:20:03 executing program 5: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@local}}, {{@in6=@empty}, 0x0, @in=@empty}}, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) setpgid(r0, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000fc0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) symlink(0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x2d0e00, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 20:20:03 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0xe822, 0x80000000) accept4$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e, 0x80800) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e00000007000000f9fff9002e779a240e18480cac305ffa2b22ec4dfea314b11cbe86d9835f578e6c09f6a25899efef3e73a908b2f901ef76e7d1dc3fd39e0aa4d189d45b6610c98e7e3263d85ce2db59708271362e0835e18db88ce597afc2a59aed72127b7a1b2d7be926342239e320ea78abfa5cf09dacc89cca7d70d2227360a3f0407be13accaf0b9c2508f81c8fa4ab205b6e7e350f68e58c16271cacd166cb60cfbee9731164494031392f360af7fb060a30b8fbf6240a2c38a5eeea9b3db2e3abda121fc08ec117a638ed2de849b084201640d41204111a043d2a4682c7761bca8d16c42dce8cf9a05351d416c3712f90cf71e2d7a88410924ce96640597580ea"], 0x105) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x20, &(0x7f00000001c0)='.)\x00') 20:20:03 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40000, 0x0) write$P9_RLOCK(r0, &(0x7f0000000040)={0x8, 0x35, 0x2, 0x2}, 0x8) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000080), 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x100, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000100)={0x380000000000000, 0x2, 0x0, [{0x1ff, 0x8, 0x7, 0xb28, 0x3, 0xffffffffffff0000, 0x80}, {0x5, 0x4, 0x1, 0x3, 0x5, 0x5, 0x3}]}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)=0x0) write$cgroup_pid(r0, &(0x7f0000000200)=r2, 0x12) r3 = accept(r1, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80) fcntl$setlease(r3, 0x400, 0x2) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000340), &(0x7f0000000380)=0x40) getsockname$inet6(r1, &(0x7f00000003c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f0000000400)=0x1c) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20020000}, 0xc, &(0x7f0000000700)={&(0x7f00000004c0)={0x208, r4, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x35c}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5a7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}]}, @TIPC_NLA_BEARER={0x60, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1, @local, 0xff}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x691a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc76c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x48}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x351}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x844}, 0x4004000) r5 = perf_event_open(&(0x7f0000000780)={0x0, 0x70, 0x2, 0x3, 0xfffffffffffffff9, 0x1f2, 0x0, 0x9632, 0x800, 0x1, 0x7, 0xb575, 0x0, 0x3, 0x7b, 0x7, 0x0, 0x3, 0x10001, 0xb79, 0x2, 0x6, 0x5, 0x4, 0x2b, 0x729b, 0x9, 0x4, 0x1, 0x4, 0x8, 0x3ff, 0x9058, 0x4, 0x5, 0x1, 0xffffffff, 0x3ff, 0x0, 0x10000, 0x3, @perf_config_ext={0x41a, 0x2}, 0x20, 0x0, 0xfffffffffffff801, 0x8, 0xfff, 0x0, 0x4}, r2, 0x9, r0, 0x1) write$P9_RWALK(r1, &(0x7f0000000800)={0x4a, 0x6f, 0x1, {0x5, [{0x14, 0x4, 0x2}, {0x0, 0x2, 0x1}, {0x8, 0x4, 0x3}, {0x1, 0x0, 0x2}, {0x40, 0x2}]}}, 0x4a) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000940)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000880)="3ebde38cf9f3cee92ff9977951736ff3048c2adc3cf449ff6bd0316bf9f46795b861837f3e1856cb44e1a2ecad48787957e270429fb306778aa90dda68135138970288feab4e3febdb9c794d99e157c375d7f5daf9cb43d0247e9d065a7907d972b9d0e39199bedfbad71560db649184ad6dbc3590873b1d1728beb2c697c3408fd0adb82eb347989b2e7ab369d0a0cd0c004bb346b20e2a31944eb69356c528c6e29a6cf93dce989b7b63c50bc0780a82e950", 0xb3, r5}, 0x68) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f00000009c0)=r2) r6 = request_key(&(0x7f0000000a00)='cifs.spnego\x00', &(0x7f0000000a40)={'syz', 0x2}, &(0x7f0000000a80)='$vmnet1@\x00', 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, r6, 0x2) umount2(&(0x7f0000000ac0)='./file0\x00', 0x4) write$9p(r0, &(0x7f0000000b00)="1e3186a7868622094e66f8384201", 0xe) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000b80)='team\x00') getpeername(r3, &(0x7f0000001040)=@hci={0x1f, 0x0}, 0xfffffffffffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000010c0)={'team0\x00', 0x0}) getsockname$packet(r0, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001200)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001240)={{{@in, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001340)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001380)={0x0, @rand_addr, @broadcast}, &(0x7f00000013c0)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001600)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x14008}, 0xc, &(0x7f00000015c0)={&(0x7f0000001400)={0x190, r7, 0x709, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0x124, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x13b, 0xef3, 0x8, 0x8a7}, {0x9, 0xffffffff, 0x0, 0x8000000}, {0x8, 0xadbd, 0x0, 0xdd2e}, {0x4, 0x100000001, 0x2, 0x6}, {0x101, 0x7, 0x3, 0x9}, {0x0, 0x43a5501f, 0x46, 0x10000}, {0x2, 0x1, 0x1, 0x3f}, {0x88, 0x40, 0x100000001, 0x9}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}]}}, {{0x8, 0x1, r12}, {0x4}}]}, 0x190}, 0x1, 0x0, 0x0, 0x4040054}, 0x8000) mkdirat(r0, &(0x7f0000001640)='./file0\x00', 0xe) 20:20:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) setresuid(0x0, 0xee01, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x47) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r3, 0x1000002192c04) setresuid(0x0, 0x0, 0x0) setregid(0x0, 0x0) socket$unix(0x1, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r3) [ 1277.921033] devpts: called with bogus options [ 1278.030257] devpts: called with bogus options 20:20:04 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000100)={'mangle\x00', 0xe2, "def06e01991bbe7119814a6ffe5411ae980310746a6ce6dc87d6636c5c88f153a86c95c948ad0ae2cc67eb435afc492a087fa187070a379f5471315e282021e85c655109d516a6f2280e3b0c80d6f49afbff7b82c354125911fab444257c5382f0050dc415172e740c6a89217704fdcb95e9b5c888767fb047e9cac2e0441bedbe66e40cf47517ea42df726d125274262d8343306a5a9fad964d18a167bf7fc345d9609546f7296c84ee08b447acd7020227053b7229d622aa641276534f869227600d9358b18c27f657cfbbbc9624067605a6e3db97b7190fcec07fb37dc6a7cdbe"}, &(0x7f0000000240)=0x106) r1 = socket$inet6(0xa, 0x2, 0x0) getdents64(r0, &(0x7f0000000000)=""/135, 0xfffffffffffffeea) dup3(r1, r0, 0x0) 20:20:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000040)=0x0) capget(&(0x7f00000000c0)={0x200f1526, r3}, &(0x7f0000000100)={0x6, 0xfff, 0x10000, 0x20, 0xff, 0x8}) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x666f) r4 = epoll_create1(0x0) fcntl$lock(r0, 0x24, 0x0) connect$inet6(r1, 0x0, 0x37e) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000000)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:20:04 executing program 2: socketpair$unix(0x1, 0x400000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2000000080803, 0x1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000000}, 0x28) r3 = accept(r2, &(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f00000003c0)=0x80) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000440)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x44, r4, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x9}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7ff}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x4010}, 0x20040000) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x4d2, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4080008}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r6, 0x900, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xc92d}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffffc1}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4000) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @empty, 0x7ff}, 0x1c) 20:20:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") request_key(&(0x7f000000aff5)='logon\x00', &(0x7f0000001ffb)={'\x00?\b', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\trist\xe3cpsgrVid:De', 0xffffffffffffffff) r1 = dup(r0) write$P9_RLERROR(r1, &(0x7f0000000000)={0xf, 0x7, 0x2, {0x6, 'logon\x00'}}, 0xf) 20:20:04 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000001b40)='./file0\x00', &(0x7f0000001b00)='vfat\x00', 0xfffffffffffffffd, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000a40)={'filter\x00', 0x1000, "ee8cea2e5ba0469cc4d778706d260b6da14528e48add89eb75f6997368f139dd20d699a132e29e7d73d6af61cff0b67aeb094dab14e7063051e496806af046105cdedd25da2f54e0980fa16aeeee543a73a8de5440ebecaf13f084731434233c24569f44206006bc735a3e0956bb40a3a2244c98bbdc57db44a42a63b26966b8a965db2ed5154d7f6cfbffe7e079c7a61906220d322c88b74ab898f929cb2b25d8a48cd54aaf337a1aa55da5171fc5fba6188fe443a1398fd2724ded8a218ed4b72172dd2d240971ed40ecc0fcb1160d56b3bb68651624e8acea8add66f2094dedc1869dec8ad09467836818f90a3df2d1dee6063025751e669dd40b656da221ca55a241ee3f6597635876f52e9bf6e67b844091a9f94f48beaff99d6eff992781387273cf09b215aba1f5579233962f6fb6f189ee6fc01e3198809249989ce3a1ed939c2bce7c496459fd62629ec42235accc35f33c0933c4c77dc14d9ae6c720c9a30ae0fc05245961c4ccf6a9c29c88fe2f63b622fea83d61869545209e41ca82ba06451c4936252ce5e4c7269a141626227a08e9fadba74f32be3e24c4c30e6efec9fca06987baaac4345ead39f89bc308d54e41303b0d90f14af7b0f13c9b977e469335db815a849b3c803e91a1cbfe1453e7d4995b9a6582627551854a854bb237cf70b79459a79c46d014ef0d36c05886c37989424586ffd80970d7f8c77eabf57073f82c4279a94b7937571ee6ee7e9e08594e2abfa54cd6745ebae1b573452b20bf8c5b651918cdf402b89eead6a557900fa293038ed4524082c39874e4018b9e6d1faab25b770696f7d78a5515c2641acc6be8bcf9610aa039fdb3ae20db27d63ad8cd0b3d38ebe75908880d48ad2de86ae87a1af3d42dbe2f86e37321a06245549f717eedc35685fb9b8a4b182dcfee4b4d9b1bbbac50d40e36f6f2f44cfca95dca92ea48ba20ac925f386cedc23eb4e9507c773e1dd96882ea5e4f3b07283554fda4954c9a480537549461e7303a22eb111f2585e84ea6e6f73b06a72dea6935530657994c62dc3cf79e51a758e5645828014df2a0c511fb3ac8b1c395a235f7f3a3e8a32b17f7cf6b7d115762ee97aa02cb9e9066336c080c0f4058ccabc312cb3b6bab6549878b6b109471dbab4145a73845eff77ebffd4fa560717491e161a40a176ca6cd5c7e7594765aea32b1138c86478767dd743918a1e0f856b0a48064ce4032ef8fa596207937eeb185202582977d05daa6ea81818ac07fbb7c379a7f931c0f4a6760545ff59964aa8ed10573d10aff800def22df3c77deb5599e6a95b2f4191d0fee99306ca3bf293f38b3918e5a680908bb935a7f010ff7a33bba0da9de3b0b14822a1e725c7f9ebe4b33fc3b051ce1df68a4791e171ced76576c21364c0b69b07541fa0e61282135d36310fb5689578a87a000060c4f715585cddfe2ac1226ff734bf4d68bba98e3e366330034daed22c7e90b06158f9df524722b5c503acde772fea9d70d54acb3805d6d65a0ed0eda9a0dd5f05b46a8ab1cf8d901dfe136c792af0b8665b8f7370a6aa4e9901744af3e34763d12224f5ba5aa3fcffff1d2e014cc57ff8f5f975e0af2aa23748d0863ee5f77d6ec7d1ad244ac80e8b095d2cfa8a2206c6065d74c8cda2e8321f0628bea23edd3da9bef49fcf1b0252d82051704c6ac35513a43cf26095251ac5623bd49ec4cde8d7fe6ff7a11809ccb9253f161c31b67c8af3ddf0d2335279cb368c944080e9193fce1e313eba57b29c97266db032ec43744ebdbc1a4073df2f85c3ebeac38ed02ae25cb939ef6fb4311aa041de6d96cf3cf8e263ed54a5621c9eb8f815da9441193e2ce38e10ac84cce22f3591c7d6cee45cabfe1359250e2388973cd6a39b07e3a3e16e8d463c4ffec50eb1791ac2798b42c0c0344fa27f480a747c3cd77bd49fa5a2c2ffe0d8c8cbb2e3c7fa9b188947411e605a775de5f66253fe820db98585b0b5a71d62e16cfdad690ef596f0b47c8295b17ece5c5d8a71491ccf84780ddd4f7b8ad30e446f0c8bebe095fb7632ec4cda15c8877f8ad945f7a501d678d2ea7ebe74f8bd893849be5c954696584cd3e040725fca8fda1a6393d72e34edbe7842c747a8db65137e71ac91da4fea7f53e8bb3e986bdb07aa9d66189bb3fa6a3ec9e8a465756fb560f084ad7ee18dbac2cee5d7e242d51634d1966977765db7ceb72cae04b7f29912cde6ebaa0cf06c3af512d02351c10e52dad8a97d33a9488dbbb212b036cde5c4ce8feb5c8789bd9a070127af9cfba4e5677d78c1798b8770909b1dae227a63a1a7f1a93b8a30377e2dd3e9362fe42677adef6258ab0c617316a35593004c5192c4d973d92f8e8ed050f8bb8de3bcf03deb4719dc54acb52f0734554f1edc4a70e6fa640d87eac39d40c0223511a755e3478fcf2809cca867d1f724b9c5777e97f757446a81cf7ecc506f5dafaaf4c208dffd428cb405201e81149b4a5e458937375e2e0924fae41bed0b84ea910d842997205ed0b77d842e58787a499acea3280c0da2736f090e0e6bcc49399a803517acd513724cda55b932c686effc0f8e4b63e7b2ab2df2d8bbaca80ed15731cdcfaf62377c8326302a5926419a8b045d95794898ec69772d974b77dc632405ed7b88aa7aaedb57a49fe6b03b170f513cbf95b94be65848b88052f48872539497026aa01773cfcb49659b0161f9d2b4b10896e3812a2f79e0ce1f14b6beb81e6fea2a01a01774376232b1bf85f1ba33bbc54c9cc0349ece27f7ffd778a4f19e1444e563374b895c8a793013c0030dea7318c71f7a6a408313f9764251ac07ab7dd0ebf5e9521407553f72077cb08107f26f61dee2d98d7871a2a442835996bbc00a70442da27132c8338777de833ef01a100587c64a56fa69d1087e40f1c91597f92fb11f88fc31f38cbce0c4f6b2c2c9e374322bb9ca99be4609a516417fd619f1df4b15e788ec6b2b72f450da467ab03f6c313c7756f28a28d587cebd6582befb0b91d44cd6c3a5e78fefed41c2e976edf036295c3c962a6385cea28dec15860e560f20c24410176fbd01094064ecb754f9464a14742c064e887b34b3cae1179be14050b4d37807ac7031d4ed7c9de33e7a055e37a131d16933e95f22fd6f291332c55e49b0263ec8930d75ab1f553fcc368e9eb17bb0caa85d2949fff7345210f839682566a2062a9ccbd551f8694e42aa6fdf18e0a2d7a6282d85607d7145ddb67bbb377632a778e70981a235d13cb704e451a59d44c01903b9acf02a84d3519fc4bfc016ff523bd83d28067937bd9f50741b91486afe43ec1a806ffb84cb99e0b6bedfbeeaa83f5a94ef6497090d514ffd444ae26d08582707eee1e7da94576fcb01f3f4eb20e2915fc1597c18babb08ae153345e4d211b3c92977d1f80113c313a87636924f5d2a0cbeae8d6a50f9f608aa5eb52ccbb417bbd2607222ac56b720b2cd4ab4565f64da05bfb8288680d47a2cca3bf11f53245c9508f36a096bd8e4b4299f45d1b8297ef06e742a2ececc8eabb69268b691bd1b7fd93fa6679a6c5e025e8cc52655b9bf132ca4a84ce904895397af5760254f538a9d70685368445a77534042d59955be2f4f942936827a86b059f5ae3a97405fae83305a26121a3c2fdaf217ce002cc3bcaada9d9daa611a2ef0532ae8c88e29d93fb1e708a99539d63fa89daa705b68db1177edf43d78c3904c58309d5c71edfe862067137d957d9fc57dbaa09fc0059b1dd1f1eaa9ef260558ee5ecc2950e2418a7f1401ea7c1837017549619ef278cfec4a9beb7555eedd730fe4d84902405e2e74a76c30351bf0234b20483eb8688618db32621897f3a819bfc4dd3bd723877b3277138222b8b7038dd1e89f4311ae67e27a5809a20240e0bfb9b95786dbfcec73fa3874cdfd50efc6a9d86392b66be4b5e70b50d0b662868a8303aed0ee62ee0dbc342e39653e370fb703e0571440f72b5396cd7da282188511bc0982a4d12cbecd4c7947d8c060803466cda4c5facdd860266ca0a8fdab9bccb01b2966b3a3ef2cbe95d3d93f95a259558594638bc1a8f039b3096442b6e28033d2add0c95892cdcbaab9240b067f0fa98456038034675d1e1851f7232d1a3dc3a4496cf5b5a2b5538a6e9ef62c58309aa45688f8cab22cb3526e87b97f7c738d5da982e8cb610635dc3c04ce9c6db82432ddf1a4e52771f8bc2d8956d29043786f36974a7df37f89c1d3a9e79cf4e0b77e8b988d0383fd221c3037fc0cf85fe3ac686c99706fe38e2b2d5a887782ff16e354357a8a56d4f43e7d684c060c826de01f6526de07623dc2719373bd3ad0d27878e69e2b06844d18a8662f6a381f0a384cec1d446134cf7fa231cc116e56d9e58883034556dd8c18f7f39f52d936c613e9249f3a74300a92bab3077a60b22279da4c83685c2c15b31f3760eefd128e94e92ef0fc29fc687e1d80b79309b8199980cd205d81d9403621698e00b4b996f9e40486c08e8d7f385471d22544d84df077f617d053405fc4949d9f4957310928ce3fb8aab1cad6489c34c7521d26e3e8b6849460a95543ae9fcc5126ccfb149610dc77d54c4aef9e29cd5ed48d30d33874c1b52c6fde1968e7e8f2d5fbc11a1850cd22fc1795d79e346749715669fee6253848d40c4b68d40a0add886c5b481923a263ef31b315295a6d9b873644c11658a58df200797ad5c619ad3382080ca9abf061d0921a167fd16f79ad4c20ae4d49eb440fbeb94e7171e3228bdb27be50b1756f874f9f425a1648d3660cb1aa58da450955117f80eb492d39820d6460f3583d2a9124905a5f185d6e6095f0f2d5a93a162c5fc0b9d610afa93cb4c5c19c3e51f9df2ace42981ef1da0e351b874bcfeec26f30b4fa2fe1521d6de204f367573ba9f70d11d6339dc42331a2acc6ad8c5a01519aeb8ddfacdefba9d250f981c98fdd372e650ffcd2aad2d026768f6aa9a100df226a5341854cfa691250e52ca57a8757d1b3588807de055b06866570914997e528cae83625ede6c5e4d3b7a8690df3a9ea3217a4e8d8a73b40809e261ad8979b512a6f32b2a1402bdabeb407bd931371719a3b5e7fbdb6a214397688422903e5cdc43646b7dd7c620d3fcd16b9d35ba3f34cd47bcbfa6aa58ae20b02962c0fb66c33cdcfc2525eeff87aa1b9cdf12310b75f42027ebcda7462dfece9e9f658312571a8f2b547b7a68fa0294fc1c67e87611f306c07ecc107938eab4a2f41a740acb6e74a9bbe54a3450b3f70606f19369f3b47b4d2e8dc8e20047ecdb3ea93f61322d4f56afea320442131afcc8d563b5e03599b506471f551fbfa7a5ee9ed5f007eab216650bb8789cd70637f20719f6ca1a2b7b367723f4150416d22bd4aea982177ed1597276c9c1faf33a059e449afff13847afd4003fcd8cc7e2d0d7e9d0f2dd0b77139ff64365526bef282ade3d640c889000185dd6cadf728c962cf735f8b0313377283a2632e41d75565251b7ba5627aae014ec2cbfc15e24ef2b767ff6c20ee769982d6f0c30b3eb50a0b3169716d282d5de99534b980fa6f5bf3338a3225182c1bf05c7c6f7988ea4bc6fa5b3be18a622ee4f3c73dfd732b05c62d40bf80a25f2a689c3f41ef5ccf8ed8e6dfff00fd937f145154ef6409b569b42ab6201690d21c7ad9f28107c6faee8bb8867d71fd42d96f49114706eae9e2b9b5fc07d97a3b099126bb239838dc48c9082d5316ca23306ef09301093042318fa24466c18409d0c5543434c7a898ccb4480c7e6515b148d8ca0952c"}, &(0x7f0000001a80)=0x1024) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f00000004c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000600)=0xe8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000800)=0xe8) getresuid(&(0x7f0000000840)=0x0, &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000001b80)=ANY=[@ANYBLOB="02000000010001000000000002000100", @ANYRES32=r1, @ANYBLOB="02000500", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="02000700", @ANYRES32=r5, @ANYBLOB="02000600", @ANYRES32=r6, @ANYBLOB="02000400", @ANYRES32=r7, @ANYBLOB="02000200", @ANYRES32=r8, @ANYBLOB="02000600", @ANYRES32=r9, @ANYBLOB="04000210c526f9a4001608002ac91aa170109b72dd4c3578ee916074ca55c6bc8b41fc97d79b443e8b14e9d72cd64cdb59094c5e2ce0495f2f7cba1ee2194be91729957de90f2239444a74686b9b97a152b5cacb9dff38e3a548578cf35151aadbec35ff25f0ccbf6a9320ae88a7b8a0832955dbc80dda9df7ae1bd531fa12a3f6027350a7ffee94a96c8a1586a1ac52c63e1570c0134b5666b32fa739975bf14ada27877e3b3fbc271699f5b682edd9c1ba47ce66ef568b3027b833cc2d77ae173c01464692ceb4b0289c8e3fd09828ec92f24d56bf92e5f60b97fdb69450b9d3081041dd", @ANYRES32=r10, @ANYBLOB="10000200000000002000000000000000"], 0x74, 0x3) [ 1279.632901] kauditd_printk_skb: 469 callbacks suppressed [ 1279.632909] audit: type=1400 audit(1554668405.835:53843): avc: denied { map } for pid=28659 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1279.842058] audit: type=1400 audit(1554668405.835:53844): avc: denied { map } for pid=28660 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1280.039832] audit: type=1400 audit(1554668405.835:53845): avc: denied { map } for pid=28659 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1280.142970] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1280.145377] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1280.148802] audit: audit_lost=782 audit_rate_limit=0 audit_backlog_limit=64 [ 1280.148808] audit: backlog limit exceeded [ 1280.164329] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1280.172633] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1280.178460] audit: audit_lost=783 audit_rate_limit=0 audit_backlog_limit=64 20:20:06 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8a200, 0x2) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000080)={0x4, 0x2}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x800) 20:20:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xfffffffffffffff7, 0x2100) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 20:20:06 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000008940)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000008700)=[{{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)=""/179, 0xb3}, {&(0x7f00000000c0)=""/103, 0x67}, {&(0x7f0000000140)=""/8, 0x8}, {&(0x7f0000000180)=""/234, 0xea}, {&(0x7f0000000280)=""/215, 0xd7}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/214, 0xd6}, {&(0x7f0000001480)=""/46, 0x2e}, {&(0x7f00000014c0)=""/248, 0xf8}], 0x9, &(0x7f0000001680)=""/229, 0xe5}, 0x101}, {{&(0x7f0000001780)=@x25={0x9, @remote}, 0x80, &(0x7f0000002940)=[{&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000002800)=""/185, 0xb9}, {&(0x7f00000028c0)=""/126, 0x7e}], 0x3, &(0x7f0000002980)=""/228, 0xe4}, 0x7}, {{&(0x7f0000002a80)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000003c00)=[{&(0x7f0000002b00)=""/205, 0xcd}, {&(0x7f0000002c00)=""/4096, 0x1000}], 0x2, &(0x7f0000003c40)=""/192, 0xc0}, 0x1}, {{&(0x7f0000003d00)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003d80)=""/130, 0x82}, {&(0x7f0000003e40)=""/229, 0xe5}, {&(0x7f0000003f40)=""/133, 0x85}, {&(0x7f0000004000)=""/70, 0x46}, {&(0x7f0000004080)=""/48, 0x30}], 0x5, &(0x7f0000004140)=""/206, 0xce}, 0x7f}, {{&(0x7f0000004240)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f00000044c0)=[{&(0x7f00000042c0)=""/176, 0xb0}, {&(0x7f0000004380)=""/95, 0x5f}, {&(0x7f0000004400)=""/154, 0x9a}], 0x3, &(0x7f0000004500)=""/83, 0x53}, 0x2a2}, {{0x0, 0x0, &(0x7f0000006980)=[{&(0x7f0000004580)=""/17, 0x11}, {&(0x7f00000045c0)=""/150, 0x96}, {&(0x7f0000004680)=""/4096, 0x1000}, {&(0x7f0000005680)=""/97, 0x61}, {&(0x7f0000005700)=""/186, 0xba}, {&(0x7f00000057c0)=""/76, 0x4c}, {&(0x7f0000005840)=""/6, 0x6}, {&(0x7f0000005880)=""/4096, 0x1000}, {&(0x7f0000006880)=""/218, 0xda}], 0x9, &(0x7f0000006a40)=""/4096, 0x1000}, 0x8001}, {{0x0, 0x0, &(0x7f0000007e40)=[{&(0x7f0000007a40)=""/67, 0x43}, {&(0x7f0000007ac0)=""/13, 0xd}, {&(0x7f0000007b00)=""/170, 0xaa}, {&(0x7f0000007bc0)=""/197, 0xc5}, {&(0x7f0000007cc0)=""/142, 0x8e}, {&(0x7f0000007d80)=""/137, 0x89}], 0x6, &(0x7f0000007ec0)=""/83, 0x53}, 0x7}, {{&(0x7f0000007f40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000008200)=[{&(0x7f0000007fc0)=""/144, 0x90}, {&(0x7f0000008080)=""/24, 0x18}, {&(0x7f00000080c0)=""/228, 0xe4}, {&(0x7f00000081c0)=""/25, 0x19}], 0x4, &(0x7f0000008240)=""/153, 0x99}, 0x696d}, {{0x0, 0x0, &(0x7f0000008580)=[{&(0x7f0000008300)=""/3, 0x3}, {&(0x7f0000008340)=""/103, 0x67}, {&(0x7f00000083c0)}, {&(0x7f0000008400)=""/44, 0x2c}, {&(0x7f0000008440)=""/122, 0x7a}, {&(0x7f00000084c0)=""/181, 0xb5}], 0x6, &(0x7f0000008600)=""/207, 0xcf}, 0xff}], 0x9, 0x0, &(0x7f0000008980)={r0, r1+30000000}) r3 = syz_genetlink_get_family_id$team(&(0x7f0000008a00)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008a40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000008b40)={&(0x7f00000089c0)={0x10, 0x0, 0x0, 0x800010}, 0xc, &(0x7f0000008b00)={&(0x7f0000008a80)={0x6c, r3, 0x704, 0x70bd28, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0x50, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x10}, 0x4040000) connect(0xffffffffffffffff, 0x0, 0x0) getpriority(0x2, 0x0) timer_create(0x4, &(0x7f00000083c0)={0x0, 0x5, 0x4, @thr={&(0x7f0000008b80)="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", &(0x7f0000009b80)="8abac1385fcb89ff5dbe81a85db8f64839e6050d3e789ef701348d7c419daa6e5a627795f889f854f095b4aa8e712a4714d3c709db938de67e0a81b78d77a6a322a77fc01a25aa25ba29e2aab6e089b80a49c572efbb6daeda8c274edb91075e3720066b21774b192541a734d70625057474b1172d06e5e5484f50f4068b63f6b83a57e7ad071b3908105cf91124a65eca5b1a05641b5a00c6092d3bf4de8d563be012010f5d27dd5caee0"}}, &(0x7f0000009c40)=0x0) timer_gettime(r5, &(0x7f0000009c80)) 20:20:06 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$P9_RRENAMEAT(r0, &(0x7f00000000c0)={0x7}, 0xfffffffffffffd59) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) pipe(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000000fff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f00000001c0)=0x6) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000340)={0x38}) write$P9_RLOCK(r0, &(0x7f0000000100)={0xfffffffffffffd41, 0x35, 0x1}, 0xfffffffffffffe17) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000140), 0xffffff35) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0xfffffffffffffffd, 0x4, 0x91f, 0xffffffff, 0x0, 0x177e, 0x80000, 0x5, 0x9, 0x3, 0x200, 0x7ff, 0x1, 0x2, 0x9, 0x6, 0x6, 0x4, 0x101, 0x3, 0x2, 0xcf, 0xaba, 0x9, 0x93a, 0x4, 0x7fff, 0x7ff, 0x4, 0x7, 0xffffffff, 0x1, 0x101, 0x9, 0x400, 0x8, 0x0, 0x7500000, 0x6, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x9, 0x3, 0xffffffff, 0x401}, r3, 0x5, r2, 0x9) 20:20:06 executing program 3: fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x2e, &(0x7f000001b000)={@multicast2, @remote, @dev={0xac, 0x14, 0x14, 0xb}}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f00000013c0)=""/4096}, {&(0x7f0000000240)=""/36}, {&(0x7f0000000280)=""/32}, {&(0x7f00000002c0)=""/227}, {&(0x7f00000003c0)=""/139}, {&(0x7f0000000480)=""/185}, {&(0x7f0000000540)=""/28}, {&(0x7f0000000580)=""/244}], 0x1000000000000030, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 20:20:06 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) futex(0x0, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x0, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000003c0)=""/8, 0x8) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="a81ec7e7a7f04d7ecf37961267075f48c56bc65f36e828984d94f54f8f52dd1c9ce2b3996c24ff1d286c956983fc51b2723ec8a30c3f1d3914f5e6f9c2676a1e990c30c07b749b6f2fd54d63cd18b770957b2bee03ae73c41de1e473946091388c7c0f4e04e41349fb7f1e92e0652f98bd8201ef93a6fb02f92373e1b502c6274e0d164b251634ea3b5db18e79eedddd900d4991cfb2f4107f0066", 0x9b, 0xfffffffffffffffb) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000000c0)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x10000, 0x4, 0xbf, 0xb796, 0x0, 0x1f, 0x5, 0x3, 0x100000000, 0x0, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x101, 0x4, 0x2, 0x3, 0x5, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x1, 0xda3, 0x80000000, 0x5, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x9) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x2, 0x0, 0x0, 0x9917, 0xffff}, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000040)={0x0, 0x0}) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x82) prlimit64(r4, 0x6, 0x0, &(0x7f0000000080)) creat(&(0x7f0000000380)='./file0\x00', 0x120) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r5, 0x0, 0x28a) fallocate(r0, 0x0, 0x7fff, 0x0) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f0000000700)=0x0) add_key(&(0x7f0000000400)='id_resolver\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)="86a712dda709e9c3466498e8e042b5312161ff6260d06d7017d7ae73fc54a970e745eace9d88e7fdaa8a1c10ce45252f443c2dd304ac4b1723e7d84ca02c457a122b2b55668fd660f46dabf800002db0401172ea9b2d85429c21ad0adde2f084f4a972d46afe1ca0fda8027ea94be1488299901739a0b85d200d3f8b6a29b5fd2fd24d1c734c5bcf1137114e46a80732a8149176b73d521de556d10df33d56a8be372d5112230158b54c97620948287015a64bc8377f0ef8a535407caa3b57135a7678201a3f9dadffe2a7fcfde9b9377d9184ccb8e5b7ad906b48da6a1b194656ff5bc2bfa55b4cadcf41b97bcdcf6d", 0xf0, 0xfffffffffffffff9) r7 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f00000006c0)={0x1, 0x61, 0x9, 0xffffffffffff0025}) keyctl$get_persistent(0x16, r6, r7) open(&(0x7f0000000240)='./file0/file0\x00', 0x40c00, 0x1) accept4$unix(r5, &(0x7f0000000940)=@abs, &(0x7f00000009c0)=0x6e, 0x80800) fallocate(0xffffffffffffffff, 0x1, 0x6, 0xfff9) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1cc) unshare(0x40000000) 20:20:07 executing program 5: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x1ff, 0x80) read(r0, &(0x7f00000001c0)=""/239, 0xef) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$int_out(r1, 0x5462, &(0x7f0000000040)) syncfs(r1) r2 = dup(r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r3, @ANYBLOB="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"], 0x19c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040000) utime(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x8}) open(&(0x7f00000005c0)='./file0\x00', 0x40800, 0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000500)=0x3) [ 1281.110932] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:20:07 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_netdev_private(r0, 0x89f4, &(0x7f0000000080)="5ff7f4e4e1d34a5f2a354c3a070e750c471b47ba600f7428e8ad02e54eec00ce3ad832dd6a6c9bcec8ec567d6fa26679d4954176215a3442455a4033527e0f119106") connect$netlink(r0, &(0x7f0000000040)=@proc, 0x2) 20:20:07 executing program 0: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x4) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) fcntl$setflags(r1, 0x2, 0x0) 20:20:07 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2440, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@dev, @loopback, @ipv4={[], [], @local}, 0xdd9, 0x0, 0x0, 0x800000000112}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getpriority(0x3, r0) ptrace$cont(0x9, r0, 0x0, 0x0) ptrace$getsig(0x4202, r0, 0x4, &(0x7f0000000000)) setsockopt$inet6_tcp_int(r1, 0x6, 0x24, &(0x7f0000000140), 0x4) 20:20:08 executing program 1: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xff, 0x2000000000000000) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x4, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="12634840"], 0x0, 0x0, 0x0}) 20:20:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x00', 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0x100, 0x6, 0x7fffffff, 0x6, 0xffffffff}, 0x14) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) unlinkat(r2, &(0x7f0000000200)='./file0\x00', 0x200) ptrace$getregset(0x4204, r3, 0x202, &(0x7f00000001c0)={&(0x7f0000000540)=""/4096, 0x1000}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0xa350ceefb0f4d8d9) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='rdma.max\x00', 0x2, 0x0) fcntl$setown(r1, 0x8, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x10000, 0x42) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0x40046205, &(0x7f00000002c0)) fcntl$setflags(r0, 0x2, 0x1) 20:20:08 executing program 5: perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key(&(0x7f0000000500)='rxrpc\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="6ca92575881c607e59ec84fe489fd98644466e78dc9831c1cd46bf05b2a5f0ccd68ecea8bef480ff41073a5b54dedccd0d459b480d324cbc9bd6191cccd6bb0f8ff229f4f9483d97860f25e8d5259e1fa97b199db7002e2a7b69f9c33e04f0a9f719b3db9ecd0df63ce213d3af96536028a00a635e05d5befa336e216fc65a36d4d01714c6e8383bb75ee359ac45282ef529f95a36434de717a9f2cc5fc4bfaa0a9a1ff77d7e57e8de63c3df391d0abbfb0503964a33c11c1dfbf733e89b9bb89bfea0ebc0723e6b4187982ae3f9157ca299fd141c1730a3adec48bc12b2ab7696c7d0fd511d805e538d", 0xea, 0xfffffffffffffffa) keyctl$instantiate_iov(0x14, r0, &(0x7f00000005c0)=[{&(0x7f0000000200)="d82f1ecd7dfb2968dfbdf6c57d4b5bf909cfe24df001b694", 0x18}, {&(0x7f0000000240)="87392f8d1f2d0dc8916a106598fefe75bdfb5daa30da06e32c6d049a69c3ea5b479b87acea7b68cafc65a7f9a8f456f56d4fb899d6269c331da0289a277e2d3ab4a552fce9f05b4196852c9a77543abe014a0e869225eda7639379986b7a9e24f0a7d38bf14a7b589b33c4c32ebdfe9337494e040eb62e410114166bf1ea6ab567b8f4373b38c12c8da1834112ff054a895609df9cbbb9b295768f28ebc7c8f43e7119e033785dd8e6b863e72793f8c51e47c56d394da19f4559", 0xba}, {&(0x7f0000000300)="220e9a505fb59f1f5357376d17b2301fcee3a2a9e40cb4774a02191ed02218ea9f46a88902cfdc71a26528514644e8765939f98e7b388bc6739a68541c5bd2574a4a79656db517b7743f70f164d0a23773d02c07de2290701712814b81169f322aa67a91ab028beefc58a34789a317c81e7db7bfd53b3fb6decc2deeafb144162825ef", 0x83}, {&(0x7f00000003c0)="7e4d7e3068ebcd6917691eff0a17e159af8a682f6235596db3a77b0eda312378e4ee9dd3d4029ff291f4818671bdef5e92c981bf352f1f73d77fc5a23f3a8f1ed3ab0a7ae6e68bc156f7646a04281db3c7a4ec94f63c5e4ce9c931a7ac0a2d4878e06692a8697a6734f82e7081cc7f72148a7c22c76eaaf2b1c8c6", 0x7b}, {&(0x7f0000000440)="130510b9f639a2477868c2db72c63c35c21ffd8120597526b0b95fbf7421b490405ac2c5a45367d49bf47155167c8aeb2262d1d6e9366498100c54a3d699533832b273d19e25e7668ca7c0ea7a2b42e35df5c9c0f836963a189c44ce09ccb2ba1b85061a663f826a7dfa0bb7e09d063df6c4a7274733426fab9c9f84d22c86368f6f", 0x82}], 0x5, r1) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00p\x80\x00', 0x1}, 0x18) ioctl(r2, 0x891a, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r3, 0xb08, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x51}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x24008000}, 0x8000) ioctl(r2, 0x8936, &(0x7f0000000000)) 20:20:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) syz_open_pts(r0, 0xc002ff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000180)={'ip6tnl0\x00', 0x3}) 20:20:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000ec0)='/selinux/mls\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) fsync(r0) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) 20:20:08 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x220000, 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)={0x4200, 0xfffffffffffffffd, 0x7}) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000480)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b4cbe82734d529345d07f1dce7d5b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb183006") ptrace$cont(0x20, r0, 0x0, 0x0) 20:20:08 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xea0f) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) faccessat(r1, &(0x7f0000000080)='./file0\x00', 0x100, 0x400) 20:20:09 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x3, 0x7f) splice(r0, 0x0, r2, 0x0, 0x110005, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) close(r5) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0x0, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r6 = socket$inet(0x2, 0x3, 0x83) ioctl$BINDER_SET_MAX_THREADS(r4, 0x40046205, 0x1fc000000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) rt_tgsigqueueinfo(r7, r8, 0x1, &(0x7f0000000240)={0x35, 0x4, 0x9}) r9 = socket$packet(0x11, 0x3, 0x300) readlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=""/120, 0x78) ioctl$sock_SIOCOUTQ(r6, 0x5411, &(0x7f0000000040)) setsockopt$packet_fanout(r9, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x2, 0xfffffffffffffffc}, 0x4) bind$inet(r5, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000200)={0x2, 0xfffffffffffffffe, @multicast1}, 0x10) splice(r3, 0x0, r5, 0x0, 0x10005, 0x0) 20:20:09 executing program 4: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fe) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x0) write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) write$uinput_user_dev(r1, &(0x7f0000000100)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 20:20:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f00000001c0)=@nl, 0x0, &(0x7f0000001400)=[{&(0x7f00000014c0)=""/128}, {&(0x7f00000002c0)=""/80}, {&(0x7f0000000340)=""/4096}, {&(0x7f0000001340)=""/180}], 0x0, &(0x7f0000001440)}, 0x8a}], 0x1, 0x40, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_matches\x00') write$P9_RLOCK(r0, &(0x7f00000000c0)={0x8, 0x35, 0x2, 0x2}, 0x8) preadv(r0, &(0x7f00000017c0), 0x1be, 0x7fffef80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000003b00)={@local, 0x0}, &(0x7f0000003b40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003b80)={'veth0_to_bond\x00', r1}) 20:20:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x11) keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x3}) connect$netlink(r1, &(0x7f0000000000)=@unspec, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) bind$netlink(r1, &(0x7f00000000c0)={0x4400000010, 0x0, 0x0, 0x709e}, 0xc) getsockopt$netlink(r1, 0x10e, 0x8000000009, &(0x7f00007e0000)=""/4, &(0x7f0000000040)=0x4) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40008000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x400c815) 20:20:10 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x1c) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000000c0)={0x4, 0x1, 0x401, 0x8, 0xd, 0x40, 0x0, 0x1ff, 0x4, 0xee1, 0xff, 0x80000000}) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x20) getdents(r0, &(0x7f0000000140)=""/114, 0x72) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xe000004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x200, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffff7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffe00}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x40800) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000300)={'raw\x00'}, &(0x7f0000000380)=0x54) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f00000003c0)={'ip6tnl0\x00', 0x3a}) r3 = accept4$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000440)=0x1c, 0x80000) r4 = fcntl$getown(r1, 0x9) r5 = getpgrp(0xffffffffffffffff) sendmsg$nl_netfilter(r0, &(0x7f0000000d00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000cc0)={&(0x7f00000004c0)={0x7cc, 0xb, 0xf, 0x518, 0x70bd2d, 0x25dfdbfd, {}, [@nested={0x17c, 0x44, [@generic="b5cabe350e2478f31fc1cd49e81f59eefcad5d96678a8e70d1d7772f928a92854b0ae1d766fa35e180", @typed={0x64, 0x88, @binary="1cb5540c14b44f7c6a82001e3bad9eba6fa908050b68dd1f95b441932c2db4c53d191e5ed479d2b7df7b76992b391e122c619e57bc7f4ef211ecd74deaeb1f8549fe1d6d43d6e728c05bd2dcdb5b615cf9a20b9df303ffc29f3e03297b248cc7"}, @generic, @generic="3d5cc2410fddf18df73415776dd3d2a1c8d5865d232c73e8ab42f08f13910e7b580b6361a43e73d7b2a636e0f5d914224b2b8691d6ce04b211e5790fe375de5757981909713d3b01696a0e2f4a9493c72a8c40c0d27091268dd498c88d1eb60790a27987c14e3b34a44ad60f504c3971d614e98b9a1ba7068eb7085f61cd172a55703b17ad8020c5104f793d364db25568f1ebdef1099b3bccb57e4f5cc07194a22bc36f79655a7568d7f8e3b30bb4ad99a59212abaf2dbf267633f725d68c28c5ca98ff0688bbe590ed73c4c48407177ff0f9b287dc55e29a042fbd46a7ab", @typed={0xc, 0x21, @str='vmnet0\x00'}]}, @generic="d7390f9966d5cd6532c23dd231140383654757a8af6fa6e1971ce667ecf89ecb06c38a238642efc642b9db6b005fa583150a3e79e598b600a8b10b6d3d36cea8ca89952a6a3896f43ec7cb55c97721484ae28b8d657c99b1f43dc13357e00884390fefedb13ac1815b73290875c30e8cbc81513512b4b0b19fd1ce04956242ea64cc424387e8eab4649f5a67d423a35f6c04f4ff55f644df788362752d5c2b9e1fb883aef794e326b8e49846c7d13c4ab69b6d208f059660766d64405684fcc2eb41ed1aa9161be3a23e8708712ab06b95c25b5dd1e0be52381996f5c46ebeac82b4c645", @nested={0x68, 0x47, [@typed={0x54, 0x7d, @binary="177b8507d8c5c72efae5b542d27ce65c3df398eef46ca9016141bc0fb7a1836b1fa16c45d73d7ce0a3fbfc993bdb9c5aa6d53605c6c1727083e53e01bcb27b0ed86f1a7ac3bcdff47626f615c7cf83d5"}, @typed={0x8, 0x37, @fd=r3}, @typed={0x8, 0x1b, @fd=r1}]}, @nested={0x218, 0x7a, [@typed={0x8, 0x3a, @pid=r4}, @generic="42df7562869d5cf48f61e296a4de9af5c82ee781fbbf9d5a9b804f41e846ee8bf296cbcd59a856c4f29245ea0bb4823738c2f5eb33954c90c714e2db5a9967d6f65b3f90202b23350f36f15e0d8c8c6565c9af69e44bbf2d794dd855ab9b877f7f4e", @generic="e74d0a4079f7c3db99141cbdcb73c67c630095ec3ef598ee49808394e22d0d2f9b0f0595cae2c7495a6a59bd542ea82cf24e3336d64bf9a81a42a6f45467bee561a9e25398911c646542ab3bfb0321f7c02c471a9afa8acdd9f1607c97c6dd12941613082c61216f4a2ee77c3c21233aac5ab81fd9081d8c", @generic="e0244c3dd4abc5ba8e0b9ceaf640e1686392d0fe5dc238425fc200bb4594c6086b1fd841ba690a7291ddebf781cb7ae1a0bcc40d1886460dfffd9f18654ca9248bf3981f18effe6525f04ac7633191d11680fc47660b9c938526e926f390ee912725742fadb4f0c0bacf8aa6e9e755e8282c6ef441d2caf50414cc53a1f7f159a7a950975499b05f87e022fcf80b078c747ea3ecbd585fd06cb6a653ee7ab8cca06cc207aaa31be52e3305c7d538001bf0b57132a390117d69d52167c40c46ac47d8fe45c310948cbb3e4875aa14af05015125487c389ac378495dffda11e7f6718158a0123d342d0665d6efa25f82f6", @generic="252162ac9299100427e99d45139dbf0e9e0996ea4d500ecd75c68dc726acefdcedc040cb6727d4e3d967d7", @typed={0x14, 0x35, @binary="786588c22db617ac476cdc8bbd"}]}, @typed={0xdc, 0x10, @binary="b6839390ed0b37bd28d820251b1d340af3fadeb3104036cffbe40742843d7bf2a537dde88c84f7a747ceb2e63971eae326f117f8666a62ab51abd20ac04998c79d8ef4929dc65a57e6ab70313cedb9888e2a4c57f1f34bdfd7220a42e696fa223f4cfd94131c5262b2a0b20870b2f18f9658f69df633e3fa100e60613c0ff7763045925ec7c521b45b342ff45171ab75f642e390833e0eda9393f41132932f54f8ca9e2fca43db3d6f0c3998ef2ea5c1e547d50313d3216cfcfec43822e217d8c98d5ac03068415d7cd74e8154f70268cc673b9058c92024"}, @typed={0x8, 0x84, @pid=r5}, @nested={0x1f4, 0x89, [@typed={0x14, 0x54, @ipv6=@loopback}, @generic="a5ef2e0ff2055cbeddf9d9bd40eaa62b10c5456486090bfd585631ce8979cbce416ce6db4824eda00dc2a394a020cee3b9a8021446ad42dd0abb67ab8002d9fc3f96482c9d85a1ea548caa", @generic="abc657f6ff10bddb6079ac21ae433b5556193c299f853cd3b7ad7a1e86b30831a7a2794cd89443f602d91703c505aa8db7eeb284b7f848b6253723e525876429bcca3681afd527e5ab1954c68e967c41e2c6effc8f8cff19be07adf7e488f68f9aaf91e3c3fbb351bbce1184edf1781ff8015471c4d3fd383ed2cc4afc30ead2aed1177ee39c5ac7003edb66112b4c25e4845f6d11b38a3f0e350d9f5c2bfbe92e9a685db8cb59269ff4a030083103a1f406e97d6292b51e15b3146f336b50cc66755baa1617ad3718fa7dec98e3542b38f63ade3a0cf14d", @typed={0xb8, 0x4a, @binary="2c01529ddb6f3e4c0a2e4749426b30ca5e5a894ae6462574c37c6709df3f1fa2de2579a0d81f3b94861068ee2f16252cda0f6a6da7ff61537c8b26152031e109794eaa53b1fc6e3f8c284fea47febfcdb4e1e600081bbe6c15f062405e56c2b8914fedd4b1d9b7252b8313b1e1f2e112159f33a87f12e5876f8cc29e1107d2729513e047f9f5789b13e2fd613296cb6c66424b646a7a8ae8ac02f31263d225100c2fb40312dc5bf7b0f4632d4caed8eecc73"}]}]}, 0x7cc}}, 0x20000000) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000e40)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000d80)={0x4c, r2, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f0c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000e80)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000ec0)=0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001140)={r6, 0xc0, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)=0xffff, 0x0, 0x0, 0x0, &(0x7f0000000f80)={0x5, 0x4}, 0x0, 0x0, &(0x7f0000000fc0)={0xce, 0x8000, 0x1bd, 0x1}, &(0x7f0000001000), 0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=0x2}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001180)={r5, r6, 0x0, 0x5, &(0x7f0000000f00)='syz0\x00', r7}, 0x30) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000012c0)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0xd500}, 0xc, &(0x7f0000001280)={&(0x7f0000001200)={0x64, r2, 0x4, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd03}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf51}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}]}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x40) openat$dir(0xffffffffffffff9c, &(0x7f0000001300)='./file0\x00', 0x0, 0x20) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000001340)={'gretap0\x00', 0x200}) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000001380)=0xd0) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000013c0)={0x7, 0x1, 0xffffffffffff9f23, 0x6, 0x30ce000000000}, 0xc) readlinkat(r6, &(0x7f0000001400)='./file0\x00', &(0x7f0000001440)=""/109, 0x6d) getpeername$unix(r0, &(0x7f00000014c0)=@abs, &(0x7f0000001540)=0x6e) r8 = accept$packet(r6, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000001600)={@loopback, r9}, 0x14) ioctl$EXT4_IOC_GROUP_ADD(r8, 0x40286608, &(0x7f0000001640)={0x7, 0xffffffff, 0xfffffffffffffffe, 0xff, 0x4, 0x20}) r10 = syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000001780)={&(0x7f0000001680), 0xc, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, r10, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_AF={0x8}, @FOU_ATTR_AF={0x8}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 20:20:10 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) 20:20:10 executing program 3: r0 = socket(0x44000000010, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_delrule={0x34, 0x21, 0x601, 0x0, 0x0, {0xa, 0x0, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_SRC={0x14, 0x2, @loopback}]}, 0x34}}, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 20:20:10 executing program 1: socket$inet6(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) eventfd(0x6) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x9, 0x3f82, 0x8000, 0x4, 0x0, 0xb18, 0x0, 0x8, 0x5, 0x1, 0x10001, 0x20, 0xfffffffffffffce7, 0x5, 0x3, 0x1, 0x1ff, 0x9, 0xfff, 0x0, 0x3, 0x8, 0x3, 0x200, 0xffff, 0x1ba2, 0x1ff, 0xffff, 0x5, 0x20, 0x0, 0x8, 0x4, 0x1, 0x0, 0x2, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x2, 0x0, 0x3, 0x3, 0x8, 0x2, 0x7ff}, 0x0, 0x9, r0, 0x2) 20:20:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x120210c}, 0xc) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket(0x200000000010, 0x2, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RWALK(r4, &(0x7f0000000080)=ANY=[@ANYBLOB="1c0000006f03000500610a000000010000000000000004010000000700000000000000200100000007000000000000002003000100030000000000000081095160000100000000000000"], 0x4a) getsockname$unix(r2, &(0x7f0000000100), &(0x7f0000000180)=0x6e) recvmsg(r1, &(0x7f0000001440)={0x0, 0x0, 0x0}, 0x0) write(r2, &(0x7f000095c000)="2400000026007f000000000000007701000000ff0100000000000000ffffffff0100ff10", 0x24) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000001c0)={r3, 0x0, 0xffffffff, 0x1, 0x581}) 20:20:10 executing program 3: unshare(0x400) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x1) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x2, 0x6d, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) [ 1284.642702] kauditd_printk_skb: 387 callbacks suppressed [ 1284.642711] audit: type=1400 audit(1554668410.845:54195): avc: denied { map } for pid=28798 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:10 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) r0 = syz_open_procfs(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@initdev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000040)=0xe8) recvfrom$unix(r0, &(0x7f0000000340)=""/79, 0x4f, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x25) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000300)={0x2, 0x0, [0x0, 0x0]}) sendmmsg(r1, &(0x7f000000ac80), 0x66, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000003c0)={0x80000000, {0x7ff, 0x0, 0x1f, 0x3f, 0x7, 0x20}}) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000400)={'erspan0\x00', 0x400}) accept$unix(r0, 0x0, &(0x7f00000002c0)) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) munlockall() [ 1284.834782] audit: type=1400 audit(1554668410.845:54196): avc: denied { map } for pid=28793 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:11 executing program 5: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) tkill(r0, 0xf) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x4000000000, 0x0, 0x0, 0x0, 0x3d}) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000180)=0x5, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1285.032780] audit: type=1400 audit(1554668410.875:54197): avc: denied { map } for pid=28793 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1285.168489] audit: type=1400 audit(1554668410.895:54198): avc: denied { map } for pid=28801 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1285.310503] audit: type=1400 audit(1554668410.905:54200): avc: denied { create } for pid=28791 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:20:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}, 0x3}, 0x1c) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e2f66696c65302070726f9b68dc93366373656c6673797374656d20203a216574683020212d5e260a96b77fe65a5313a9d7bf9ddd4123b99dc506ba41a4bec0ff17359807d7bcc42f533257abf409bd609598eeb54f9cbd825d5d40e4f1e10474d7b83adf359310f3bd696d0896653071a54e877a6d5e0553fd6acc2d6f70469612f9e2278bc16715"], 0x87) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) [ 1285.505792] audit: type=1400 audit(1554668410.905:54199): avc: denied { map } for pid=28798 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:11 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) poll(&(0x7f0000000200)=[{r0, 0x8}, {r0, 0x1004}, {0xffffffffffffffff, 0x4200}, {r0, 0x1}, {}], 0x5, 0x80) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x3) [ 1285.581298] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1285.625941] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1285.638190] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1285.646667] audit: audit_backlog=65 > audit_backlog_limit=64 20:20:11 executing program 1: r0 = memfd_create(&(0x7f0000000000)='/dy\xbdv/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) accept4$unix(r1, &(0x7f0000000400), &(0x7f0000000480)=0x6e, 0x80000) r2 = accept(0xffffffffffffff9c, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x801}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, r3, 0x0, 0x2, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffc}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x909}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) munmap(&(0x7f000053c000/0x2000)=nil, 0x2000) r4 = getpgid(0xffffffffffffffff) ptrace$peekuser(0x3, r4, 0x7fffffff) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="200129bd7000ffdbdf25010000000000000002410000001000137564703a73797a3000000000"], 0x2c}}, 0x4000) 20:20:11 executing program 3: socketpair$unix(0x1, 0x20240000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10000, 0x11) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000080)={0xe, 0x2, 0x1, 0x1, 0x4d, "b5bee3cc502dbda24c4e3cdf9d1cafb4a8b14e01115a964b561ca57f092c876b6469f88c026a4cacfcaf2e85faf9f706634e05c677a979f599afddb7c779b8e8b5b72e9ca4e43d6316f52af004"}, 0x59) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='cgroup\x00') preadv(r2, &(0x7f0000000480), 0x2000000000000113, 0x0) r3 = gettid() ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000240)) ptrace$setsig(0x4203, r3, 0x2, &(0x7f0000000100)={0x11, 0x6, 0x2}) 20:20:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x5) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000440)) unshare(0x40000000) socket(0x0, 0x0, 0x81b3) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000200), &(0x7f00000003c0)=0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000240)={@remote}, 0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) fcntl$getown(r4, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') dup2(r0, r3) close(r1) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, r6, r7) 20:20:12 executing program 5: socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000240)="911d89bbc0f5cad4c3ed890f0d91ba3ac71e30768d9dab7c980c8afc2c76c1118491680af616ea7b1876f75336ac587cc134adb5e2480f078ff39c8abc8cab1edeac6952aa7316c91fc5856d4a67484a7f1d573f93251c1d1b38d4ce7d0c3e2ad6df106d3a9f0fd913ee432c922b00b7654d7147c324a4888325bf37927dca9c39f46d5f72487d8a05cadeaedba448673b2d7c014675065dab300eb871f48642996e36c128f2426b0630e90441ce1a81a9b2caa2b2b7b2", 0xb7, r1) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000300)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000180)=0x3c, 0x20002000007) listxattr(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socket$packet(0x11, 0x200002000000003, 0x300) 20:20:12 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x7fff, 0x576685fa9ebe32bb, 0x0, 0x20, 0x0) 20:20:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f00000000c0)={@initdev, 0x0}, &(0x7f0000000240)=0x14) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/netfilter\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010001000000000060f30000d76b0000fcffffff7a09fcff08000000013404000010000095000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x7, 0xa2, &(0x7f0000000180)=""/162, 0x41f00, 0x1, [], r1, 0x5, r2, 0x8, &(0x7f0000000300)={0x7ff, 0x6}, 0x8, 0x10, &(0x7f0000000340)={0xf4, 0xffffffff, 0xff, 0x8001}, 0x10}, 0x70) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) 20:20:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/4\x00') ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)={0x0, 0x99, 0x7}) 20:20:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x80011, r1, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x6543b2a0e12d449) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x1f, 0xfffffffffffffa71, 0x9, 0xfff}, {0x3, 0x3, 0x6, 0x200}, {0x40, 0x6, 0x1, 0xffff}]}) poll(&(0x7f0000000040)=[{r1, 0x1000}, {r0, 0x400}, {r0, 0x200}], 0x3, 0x3b5) pipe2(&(0x7f0000000000), 0x0) mremap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 20:20:13 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000000c0)=""/177) connect$unix(r0, &(0x7f0000000000)=@abs={0x1}, 0x6e) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000240)=@add_del={0x2, &(0x7f0000000200)='lo\x00'}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000180), &(0x7f00000001c0)=0xc) 20:20:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000100), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet_int(r2, 0x0, 0x31, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/156) ptrace$setopts(0x4200, r3, 0x2000008, 0x400004) tkill(r3, 0x3c) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x4}, 0x68) 20:20:13 executing program 3: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x10000, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x9, 0x8, 0x7, 0xfffffffffffffffd}, {0x9, 0x1f, 0xcc, 0xfffffffffffffffa}, {0x8000, 0x5, 0x800, 0xfff}, {0x100000000, 0x800000000000, 0x800, 0xffffffffffff4966}, {0x1, 0x8, 0x7f, 0x7f}]}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000040)={0xb77, {0x80, 0x8001, 0x5, 0x100, 0x2, 0x9}}) ioctl$sock_netdev_private(r0, 0x89f5, &(0x7f00000001c0)="c633577afe3491e5ae4a17bb23c96387fe15ee41fb95e7fd8bfa09ce8c580db04c97031d094ddbd7da455295be83bd02db3f23035d147bd5931df5f563dce8703a53b5a32bb1565ad03010d54c60dc99cde22dd98c9be3d75967d3b2013848a6741c5ecaae61d2d78c67d25b182aa44cd43c8cb6ea1a0017d2f9e6763bde61c193f546afe904981c9946") 20:20:13 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000000)) tee(r0, r0, 0x1, 0x0) 20:20:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = add_key(&(0x7f0000000240)='logon\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000480)="df3bd39a794f56d7d1564afc88bb25919c705e942ec5d1e3c2b09ab799c8e16a284f3012cfc606915ab2a7c85e0cab590a5dc8eaa4013be196de1f5903bfea24d954959968e79abf02be53210e561a0759d0958ef1672b4fc0dae521049a977030ac321b26080422e37988a104aad4f0c2615770c01ceb", 0x77, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x1000000) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f0000000380)=""/199) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) stat(0x0, &(0x7f0000000180)) bind(r2, &(0x7f0000000100)=@nfc={0x27, 0x1, 0x2, 0x1}, 0x80) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) 20:20:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000001980)={0x1, {{0x2, 0x0, @remote}}, 0x0, 0x1, [{{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}]}, 0x190) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) 20:20:15 executing program 2: r0 = eventfd2(0x800, 0xffdffffffffffffd) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x1000000b}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e20, @remote}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x40, 0x0, 0x0, 0x0, 0x21, &(0x7f0000000040), 0xffffffffffff8001, 0x4a, 0x3}) 20:20:15 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000000)={{{@in, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x200, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000380)={0xa, 0x0, 0xffff, 0xe90}, 0xa) setresuid(r0, r1, r2) r4 = inotify_init() close(r4) 20:20:15 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) r1 = socket$inet(0x2, 0x3, 0x2) getsockopt(r1, 0xff, 0x1, 0x0, 0x0) 20:20:15 executing program 0: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) bind$inet6(r3, &(0x7f00000002c0)={0xa, 0x4e22, 0x1, @mcast2, 0x380}, 0x1c) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x24000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f00000000c0)={r4, r5/1000+30000}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000040000000000000000005d1e4e6500"/28]) r6 = socket$packet(0x11, 0x2, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000240)={0x3, 0x1, 0xffffffff}) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7, 0x4}, 0x4) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000000)) r8 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r8, 0x10099b7) sendfile(r2, r8, 0x0, 0x88000fbfffffc) connect$unix(r3, &(0x7f0000000100)=@abs, 0x6e) 20:20:15 executing program 3: request_key(0x0, 0x0, 0x0, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x800, 0x0) write$P9_RCLUNK(r2, &(0x7f0000000340)={0x7, 0x79, 0x2}, 0x7) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f00000000c0)=""/36) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) getuid() setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000100), 0x4) stat(&(0x7f0000000140)='./file0\x00', 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="02000000020001000000000000000000", @ANYRES32=0x0, @ANYBLOB="040000000000000010000000000000002000000000000000"], 0x2c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:20:15 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000440)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60a1d8f200103a00fe800000000000000000000000000000ff0200000000000000000000000000018008907900"/70], 0x0) 20:20:15 executing program 5: add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="0763a3771847526109c77744d17893e72af66235311c87541dfaeee3b5d4421a36cce5c702f5b9c5d82a74371bccc2835da5004633accdf0de71d6d6e80714f98d63b7bd27380805e2847a4b0228dce09c0f038dc8f0d2834aad028da0a35f1359dc3d7689aaa0c00d52ca", 0x6b, 0xfffffffffffffffd) r0 = request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='keyring\x00', 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)='keyring\x00'}, 0x30) ioprio_get$pid(0x3, r2) r4 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r4) keyctl$search(0xa, r4, &(0x7f0000000a40)='keyring\x00', &(0x7f0000000a80)={'syz', 0x1}, r4) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) r5 = dup(r3) ioctl$RTC_WKALM_SET(r5, 0x4028700f, &(0x7f0000000240)={0x0, 0x0, {0x1b, 0x1f, 0x9, 0x5, 0x2, 0x2, 0x5, 0xf1, 0xffffffffffffffff}}) 20:20:15 executing program 4: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setuid(r0) r1 = add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="7aa4fd8135887a144df5548f52bfb898797f459518e0b4e3ba611687c88c5ef965010337c713736fdff7ae0c4f9520bf37d860bf73630768bf28a5520532a2f389d8d417072a3f4715f72d0ff893ee56b3bf5edda931a7f5b6501e1daaf522dddd0135a44b0ca2ae1f942c23ae35c7d89c66a583d4c30198220389a876ad59c4ef193951d8c23d9f73df887c40fb167861b25112136169020799eebc204389debee08bfb3407a986c8c861428324cdb30d064901d54e20ee106d7a77cfc2fd0d0666014aa6d13c481a3e4a39590de65e7add7e6b1af58eed5b8a35704d", 0xdd, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x2, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r3, &(0x7f0000000280)='./file0\x00', r0, r4, 0x1000) write$P9_RSETATTR(r3, &(0x7f0000000380)={0x7, 0x1b, 0x1}, 0x7) keyctl$unlink(0x9, r1, r2) 20:20:15 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c12a41d88b070") setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0xb4, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYBLOB="4d62491c27690d422c3c869d8a3cbacf2adaae7687cadee2a954036f137533e9bc3a584284aeaab3ada4f01c3d80102d5f9c00e9a1b5733eae499707800a3b427f5616df5cc15c10c6768152b135aa4056402773a39ba2e21ef2d6f554a9d29ecb0f559d2ea9f3e6b994614ec239c70dc17f82190db9ba98f12c2dc71c00"/138], 0x8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000000c0)={{0xaf, @multicast2, 0x4e22, 0x0, 'wlc\x00', 0x0, 0x8, 0xd}, {@multicast1, 0x4e24, 0x2, 0x200, 0x7, 0x8}}, 0x44) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'sit0\x00'}) shutdown(r0, 0x0) 20:20:15 executing program 1: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000000100)='./bus\x00', r0, &(0x7f00000001c0)='./bus\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) write$input_event(r0, &(0x7f00000000c0)={{r2, r3/1000+30000}, 0x3, 0x6, 0x80000000}, 0x18) ftruncate(r1, 0x208200) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x102) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) read(r4, &(0x7f0000000180)=""/19, 0xfffffe47) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) 20:20:15 executing program 5: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x1) futex(&(0x7f000000cffc), 0x1, 0x0, 0x0, 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000000c0)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000100)={0x230, r2, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x88}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f82}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1c5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xaca2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xd3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x542}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @empty}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'irlan0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x534, @dev={0xfe, 0x80, [], 0x16}, 0x2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x81, @mcast1, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e24, @broadcast}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10000}]}, @TIPC_NLA_SOCK={0x0, 0x2, [@TIPC_NLA_SOCK_REF={0x0, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x0, 0x2, 0x33adc771}, @TIPC_NLA_SOCK_REF={0x0, 0x2, 0xffffffffffffff00}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xfffffffffffffffa}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) 20:20:16 executing program 4: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fdatasync(0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'bridge0\x00', &(0x7f00000000c0)=@ethtool_sfeatures={0x3b, 0x4, [{0xffff, 0x3ff}, {0x7, 0x100000000000}, {0x342, 0x200}, {0x7, 0x1f}]}}) open(0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) [ 1289.958915] kauditd_printk_skb: 273 callbacks suppressed [ 1289.958924] audit: type=1400 audit(1554668416.155:54454): avc: denied { map } for pid=28949 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:16 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x25) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x100, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffff7f00020000d6"], 0x9) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000280)="df157dda6611ad4aacc1bc2851c024a8115ac95e6cfb5f4477aa997a11460094ea13a709849d65e2047f726e4f58a63e752a53721a89e416110b3a1b6280fb93a3c914a3d9cd9367adbc54b763c4d5c1bf9c7e9fa1c64600a038c29b199806e57adff03f7d4d1471c697c1b6e4cdcc2e459aad5442be0915953de382", 0xfffffffffffffddd, 0xfffffffffffffffe) getdents64(r1, &(0x7f0000000440)=""/186, 0x5f5) symlinkat(&(0x7f0000000100)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') [ 1290.076675] audit: type=1400 audit(1554668416.205:54455): avc: denied { map } for pid=28949 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1290.150131] audit: type=1400 audit(1554668416.225:54456): avc: denied { map } for pid=28949 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1290.231405] audit: type=1400 audit(1554668416.225:54457): avc: denied { map } for pid=28949 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20000040) r1 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r1, 0x406, r1) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) 20:20:16 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) r2 = dup3(r0, r0, 0x80000) renameat2(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000080)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) syz_read_part_table(0x40000000000, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)=0x0) setxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@known='trusted.overlay.nlink\x00', &(0x7f0000000280)='./cgroup.cpu\x00', 0xd, 0x1) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x8, 0x5, 0x2, 0x7fff, 0x0, 0x3, 0x2100, 0x0, 0x6, 0x9, 0x7f, 0xfffffffffffffff9, 0x5, 0x6, 0x3, 0xffffffff, 0x2, 0x4, 0x7, 0x4, 0x1, 0x4, 0xf7, 0x0, 0x7, 0x4, 0x10001, 0x100000001, 0xffffffffffffffe0, 0x8, 0x1, 0x8b9, 0x800, 0x7, 0x0, 0x6, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xf}, 0x3000, 0x4, 0x263, 0x7, 0x8, 0x8, 0x8}, r3, 0x10, r0, 0x8) [ 1290.398044] audit: type=1400 audit(1554668416.255:54458): avc: denied { map } for pid=28949 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1290.542781] audit: type=1400 audit(1554668416.275:54459): avc: denied { map } for pid=28949 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1290.671389] audit: type=1400 audit(1554668416.275:54460): avc: denied { create } for pid=28948 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1290.779286] audit: type=1400 audit(1554668416.275:54461): avc: denied { write } for pid=28948 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1290.947010] audit: type=1400 audit(1554668416.315:54462): avc: denied { map } for pid=28949 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1291.126768] audit: type=1400 audit(1554668416.315:54463): avc: denied { map } for pid=28949 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'ipddp0\x00', 0x4000}) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000040)=0x2000000000000001, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='io\x00') ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000140)=0x3) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000540)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000000c0)={@multicast2, @dev={0xac, 0x14, 0x14, 0x1c}, r2}, 0xffffffffffffffa7) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) sendto$packet(r0, &(0x7f0000000080)="b1", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r0, 0x1) 20:20:18 executing program 2: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a60000000a8430891ed0000390009000a000c00060000001900a30700000000000000dc1338d54400009b841338caaee86ef75afba3de448daa7227c43ab8220000060c00", 0x55}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x5, 0xfffffffffffffffe) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e22, @multicast2}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x4, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'ifb0\x00'}) getsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:20:18 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000340)) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000080)={0x100000000, 0x1, 0x9}) 20:20:18 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/snmp\x00') ioctl$KDSETLED(r0, 0x4b32, 0xff7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000100)={0x0, @aes256, 0x3, "344101150866d1c8"}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000200)=""/19, &(0x7f0000000240)=0x13) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, 0x0, &(0x7f00000001c0)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 20:20:18 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f00000002c0)=' ', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) gettid() r1 = getpgrp(0x0) r2 = syz_open_procfs(r1, &(0x7f0000000280)='attr/keycreate\x00') getsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000080)=""/176, &(0x7f0000000140)=0xb0) capget(&(0x7f0000000040), 0x0) pread64(r0, &(0x7f0000000180)=""/156, 0x9c, 0x0) 20:20:18 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x177, 0x4) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000140)=0xffffffffffffff91, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000020d000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x12}}, 0x1c) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) recvmmsg(r0, &(0x7f0000f61000), 0x353, 0x2040, 0x0) [ 1292.117162] IPv6: NLM_F_REPLACE set, but no existing node found! 20:20:18 executing program 1: setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x4ed4, &(0x7f0000000100)=0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000a40)=ANY=[], 0x0) ftruncate(r3, 0xbb1) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x80000, 0x12) openat$ptmx(0xffffffffffffff9c, 0x0, 0x82, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 20:20:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) fallocate(r0, 0xd, 0x0, 0x100000001) vmsplice(r0, &(0x7f0000000580)=[{&(0x7f0000000000)="d789b41c54fc", 0x6}, {&(0x7f0000000040)="934ca4067c7ee2f67ff49e39264416f3aa088f49c8e18773ae71f35f8c1cca3f2079e46c26d0a18113038452b6ccbd26be0d6f7849c46a3b30f770b528abbb660c85d32e79eed996689e74b2064f11c49a83602ce1807f6f99bb132cbb3174e92f15260845bdfd7a79a43de8c733e0bc68fa6201d8e121a0d7f93bd6d18519a64789a60353d4e55892c51d2880d6ef61d761c8174aae6b1780f6b13de1a0225c692c2dffbf9adf62ed05a6814bee2fcd028a09457072b8c3336006cbe74c03b238d8fcecb7c3ae087bc8c7", 0xcb}, {&(0x7f0000000140)="9d00b3d68f87be09a6e91f676975303c00be6a5ced351bc97765cf22984fe686b37975dab3ed5a5ca6721fb2b13ce0405cf61eb83ffee459510c8b13d404e5089c463531a026c228c5a88b5a5d7bea514644fc9691537294f091d1449e2993aa69a6e7cb6b2f66decc18f72d91f5e14059f351f1b12af944e45d375e6737514fde7f115240773d2161d6ddedd8a537c3dbf1ec32bbb3eafa711d33374e67bf", 0x9f}, {&(0x7f0000000200)="50cd9697d08adbe6986015e4afc62225a224498572acb7505307e6a23dbc2b3f4963cb9de6deeff4cc6b51ce2a63095423f5c570b58da105bb3114509b4a61bb2800189c53205eeccfeac474f4e43efca1197efd", 0x54}, {&(0x7f0000000280)="9dedd035474bebd380552406fd6c3af2dc2996a59473c4454b890f6a790aff44855fa357614814704b448dfe9580a3a1e734400967cf66c6668a1935d795360c6904505d78b8a851e01cff23ef4b8d3c9bad446000a1294fbe5d108557f54abdca7de7648b692b9ee10e61748583e5d3c86aa437ae1a", 0x76}, {&(0x7f0000000300)="e430d7b8b6a6e02ddff5bb4978503fb3d5cd0c8a3bff1c6e1153b36432921a71cbb659bcf52017e0ca7c27ffe94db786f97b7b83", 0x34}, {&(0x7f0000000340)="208e2796da8389686ece353abc68720befea1db2ccb06dede132119c924adde7e748c3bd0f4df92337c41d92458bbf745792411d581d3b28a3d88322a7f035fc3ac1cf5dd082103490d14f095d5a519ad7900dd38ba7d4a0a7f6031a57dff6094e9729a707cd65921a09fb2859", 0x6d}, {&(0x7f00000003c0)="85a246be256b63261dad5127b5287617c47b10e139016a71da78718cbd3060058feddbc15555fe34c8f0945ea5494df93fca0b1c44c4bc5b89b919ecdab2fa95b764745bc59f3f2a0295ec9843609c34dc31e65d94c86aea083dfc978f4efa4ba2eb02f41d35ce48750e981d32145c19ffe090319b89d5465e6b15cbf0e38c0ca781e558986ccfd950a36cdc1be5bbc8a33b27", 0x93}, {&(0x7f0000000500)="2f92b41c8bcfed1885033f642d502984ec30503a3a64a09b348b031c7b12930d09603ed3e33c96d72f3a1f46affb0e5e2b78348a0494d067ec9552456be6551cf92c14d693360ca1625230720f361cf9", 0x50}], 0x9, 0x1) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000640)=@dstopts={0xff, 0x45, [], [@hao={0xc9, 0x10, @mcast2}, @hao={0xc9, 0x10, @local}, @calipso={0x7, 0x28, {0x8, 0x8, 0x200, 0x7fff, [0x2, 0x7, 0xfffffffffffffff8, 0x0]}}, @pad1, @generic={0x7, 0xe2, "6f91330fc0ebe710ff536830983db0aec0165815a5d7bf4d0908ce8ae58ab3120066a342a422937f8948a5a838b62e953c921833f0e280e3f469c384fb34d28f4370b26821c61d503d09ea44dab6635e8e05177e2028b9ece1e6fac2bb8d366128c3d266a285458a9fb3613cee11a115901052d3eb4d6de49bdc6bf88520148011f31a477b626af8d7c48be44cbd360bdf6e7795f39d4b73fa142da1799c44eae3c18af07ecd60ce6c6acfa3d37f268f5117cc7e0f83e15809e9b9a6623f33ba99234e4cf3252250eb72a2f03fac2c5468d2d46aeb7e8f20138d19dee63069f9111b"}, @jumbo={0xc2, 0x4, 0x7}, @generic={0x200, 0xcc, "3419b2123f043da25361e38cb8f4f7e8e5ee69317866dde24d3df88ada3bf1dafdc6702a190e8311b80620cdc2b346abd61ae8aaa82b79060c2e7431b002380539b68e1959699da460c249101a132fa022fac278387fcf5ca449bfc2b9c42567eee9b900626190296c82cda79f646f7c4a69b81114d78c2d47a78539edbe2323fa6b236e9b7eb72ce7347bcc26f64f9ead205f4c1e8e396fd8b9113940fb2ead9d430877607b42fb2a734d612aab284cd7d05104a19b1e31cc9281fd7ac940b1c7ffa645b9210988c57dbbff"}, @calipso={0x7, 0x18, {0x8000000000000000, 0x4, 0x2, 0x4, [0x1455, 0xffffffffffffff00]}}, @jumbo={0xc2, 0x4, 0x6}]}, 0x238) 20:20:18 executing program 4: r0 = open$dir(&(0x7f0000000380)='.\x00', 0x0, 0x0) unshare(0x20004400) fchdir(r0) [ 1292.208719] IPv6: NLM_F_REPLACE set, but no existing node found! 20:20:18 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfffffffffffffbff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) 20:20:18 executing program 3: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000004b80), 0x80000) socket(0xb, 0xa, 0x7ff) socket(0xa, 0x3, 0x7) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000004cc0)='/dev/vga_arbiter\x00', 0x4200, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000004bc0)=0xa1c0c99c616ff92a) 20:20:18 executing program 0: clone(0x2002102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000300)={'icmp6\x00'}, &(0x7f0000000340)=0x1e) ptrace(0x10, r0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) wait4(0x0, 0x0, 0x0, 0x0) 20:20:18 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) geteuid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) setuid(0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffff52) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x354, r2, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1f}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x948}]}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x886}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0xf0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xbe, @local, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xa, @local, 0x400}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xe63, @rand_addr="8bfb89f577c1d06fb0716f0238f6b585", 0x1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1000, @dev={0xfe, 0x80, [], 0x29}, 0x6ccd}}}}, @TIPC_NLA_BEARER_NAME={0x8, 0x1, @l2={'ib', 0x3a, '\x00'}}]}, @TIPC_NLA_LINK={0x98, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_BEARER={0x6c, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x6, @rand_addr="d0cf68b1e1b5273d198db0508e7891d3", 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @loopback}, 0x8}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x85}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4b7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffc}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}]}]}, 0x354}}, 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) socket$inet6(0xa, 0x6, 0x8) sendto$packet(r1, &(0x7f0000000340), 0xfce4, 0x57, 0x0, 0x0) 20:20:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000240)=0xc) r3 = syz_open_procfs(r2, &(0x7f0000000040)='fd/4\x00') lseek(r3, 0x0, 0x1) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 20:20:19 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./bus\x00') rename(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./bus\x00') 20:20:19 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x880, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x3, 0x9) r2 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r2) execveat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000140)=',\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='keyring\x00'], &(0x7f00000003c0)=[&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)='syz', &(0x7f0000000340)='proc/].\x00', &(0x7f0000000380)='\x00'], 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x3ff, @dev, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) 20:20:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000040)={0xa, 0x0, 0x23, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x18, 0x0, &(0x7f0000000000)) finit_module(r0, &(0x7f0000000080)='trusted-^-\x00', 0x2) 20:20:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x2, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000180)) r3 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r3, 0x0, 0xfff, 0x80000000, 0x8}) r4 = gettid() setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2dc, 0x0}, 0x10) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x6) fcntl$setstatus(r1, 0x4, 0x42803) mremap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) 20:20:20 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000140)) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000100)=0x5, 0x4) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000280)={0x7, 0x3ff}) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4ffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x3, 0x0) write$P9_RMKDIR(r0, &(0x7f00000002c0)={0x14, 0x49, 0x2, {0x56, 0x1, 0x2}}, 0x14) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f00000001c0)={0x5, 0x8, 0x16, 0x3f, 0x6, 0xfff000000000000}) prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000ffd000/0x3000)=nil) 20:20:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14, 0x69, 0x0, {0x46, 0x1}}, 0x14) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b", 0xc5, 0xfffffffffffffffe) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xfffffffffffff801, 0x4560f817, 0x8, 0x25f9a4d2, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0xf75, 0x3, 0x6, 0x8, 0x7, 0x1, 0x0, 0x3, 0x0, 0x8, 0x0, 0x8, 0x9, 0x0, 0x0, 0x7ff, 0x1, 0x3ff, 0x0, 0x7, 0x1, 0x8, 0x0, 0xbc31, 0x3f, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0xe7}, 0x220, 0x0, 0x0, 0x5, 0x20, 0x80}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x2d) setns(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, &(0x7f00000000c0)=0xfffffe96) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000200)=0x9) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x7, 0x7, 0x2000}, 0x4) dup2(r2, r1) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="38010000100013070000000000000000e000000200"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}}, 0x0) r4 = getgid() setfsgid(r4) 20:20:20 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400801, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e24, 0x101, @ipv4={[], [], @multicast1}, 0x8}}, 0x0, 0x7, 0x0, "4b345449a110c93feff2b11d0f4684759b759c2269ac1f5c225f4b69c217f1ce1c8076add907d29dfd1f83e24dffa131a27ace94c272639ff87740e96cf523aa5ab5766ec2614709f16953c7b0c82493"}, 0xd8) 20:20:20 executing program 3: socket$inet6(0xa, 0xe, 0x6) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) writev(r0, &(0x7f00000001c0), 0x0) 20:20:20 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000300)='./file1\x00', 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r2, &(0x7f0000000080), 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknodat(r0, &(0x7f0000000000)='./file1\x00', 0x8002, 0x7fff) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 1294.943794] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 20:20:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) write(r1, &(0x7f0000000140)="240000005a001f00ff03f4f9002304000a04f51108000100020100020800028001000000", 0x24) socket(0xb, 0x3, 0x7) [ 1295.038837] kauditd_printk_skb: 411 callbacks suppressed [ 1295.038845] audit: type=1400 audit(1554668421.235:54875): avc: denied { map } for pid=29097 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.064815] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 20:20:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x5, 0x42200) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, 0x0) 20:20:21 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) lseek(r1, 0x0, 0x3) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) getsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000140), &(0x7f00000000c0)=0x4) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) lookup_dcookie(0x400, &(0x7f0000000180)=""/213, 0xd5) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0x2fa) [ 1295.152956] binder: 29098:29103 transaction failed 29189/-22, size 0-0 line 3118 [ 1295.169305] audit: type=1400 audit(1554668421.245:54876): avc: denied { map } for pid=29097 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.240483] binder: 29098:29104 got reply transaction with no transaction stack [ 1295.268511] audit: type=1400 audit(1554668421.265:54877): avc: denied { map } for pid=29096 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.293415] binder: 29098:29104 transaction failed 29201/-71, size 0-0 line 3026 [ 1295.328636] binder: 29098:29103 transaction failed 29189/-22, size 0-0 line 3118 [ 1295.328672] binder: 29098:29104 got reply transaction with no transaction stack [ 1295.383470] binder: undelivered TRANSACTION_ERROR: 29189 [ 1295.389648] binder: undelivered TRANSACTION_ERROR: 29201 [ 1295.410505] audit: type=1400 audit(1554668421.285:54878): avc: denied { map } for pid=29096 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.450641] binder: 29098:29104 transaction failed 29201/-71, size 0-0 line 3026 [ 1295.484212] binder: undelivered TRANSACTION_ERROR: 29189 [ 1295.489998] binder: undelivered TRANSACTION_ERROR: 29201 20:20:21 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) prctl$PR_SET_UNALIGN(0x6, 0x3) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000480), 0x5000}}], 0x2, 0x0) [ 1295.550160] audit: type=1400 audit(1554668421.285:54879): avc: denied { map } for pid=29097 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.661156] audit: type=1400 audit(1554668421.295:54880): avc: denied { map } for pid=29097 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.754476] audit: type=1400 audit(1554668421.305:54881): avc: denied { map } for pid=29096 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:22 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') write$P9_RVERSION(r0, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x1, 0x8, '9P2000.u'}, 0x15) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000080)=""/231, 0xe7}], 0x1, 0x0) [ 1295.855600] audit: type=1400 audit(1554668421.305:54882): avc: denied { map } for pid=29096 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0x6dc6, 0x8, '9P2000.u'}, 0x15) sendfile(r0, r0, 0x0, 0x34bc) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) [ 1295.979356] audit: type=1400 audit(1554668421.335:54883): avc: denied { map } for pid=29097 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1296.082573] audit: type=1400 audit(1554668421.335:54884): avc: denied { map } for pid=29096 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:23 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) socketpair$unix(0x1, 0x40000000000002, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_sigaction(0x1, 0x0, &(0x7f00000004c0)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000500)) 20:20:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xa0001, 0x0) fdatasync(r0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x584c07d9, &(0x7f0000000980), 0x100000000000008a, 0x0, 0xfffffffffffffe03}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001600)='ns\x00') getdents(r2, &(0x7f0000000440)=""/46, 0x2e) r3 = socket$inet6(0xa, 0x3, 0x2) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000c04000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/4096) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f000064b000/0x3000)=nil) munlockall() r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r5, 0x0, 0x480, &(0x7f0000000380), &(0x7f00000015c0)=0x40) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x1) r6 = socket(0x11000000000000a, 0xfffffffffffffff9, 0x105) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000240)={0x7, 0x5}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @mcast2, 0xf5d, 0x4, 0x0, 0x0, 0x0, 0x20000, r7}) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000016c0)) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@remote, 0x7e, r7}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000000180)={@mcast2, @mcast1, @loopback, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffb8fa, 0x83420004, r7}) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000001e40)=[{&(0x7f0000001d40)="24eec73d9aed3525509f34f91858b4b108fb20da5198dcacf4f2992a4f8e30c24911d81f05a0a7ea44d481f0d9ef80f923b02acfdb808a534e0020b8146975f0cb1e3c05c2307998eb0824a0870589fc25b705d801b28aef469542b26201b32ac35f1c8211fc0ef35b284cc2d2c253786392adbbd816b0c14affea4b54acaf66a9810189cd263dff17c179dff6650131c01efb4587e4162dc35caa5342f9977eca3bbe6065430c7251093e276f876e31f1e4fabbd28ecb8bb4c9c6dee0d8619109bc3e076957214bbbcbb761d592ec1979866037", 0xd4, 0x3}], 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0xfab, 0x0, 0x3, 0x2, 0xffffffffffffff9c, 0x7}, 0x2c) ioctl(r4, 0x3, &(0x7f0000000340)) r8 = syz_open_dev$evdev(&(0x7f0000001900)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r8, 0x40104593, &(0x7f0000001480)={0x1e, 0x0, 0x0}) accept$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14) 20:20:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000002c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x20008, 0x0, 0x200000000000000, 0xfffffffffffff750, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0xfffffffffffffffe}) ioctl$TIOCSETD(r1, 0x5412, &(0x7f00000001c0)) fcntl$setpipe(r0, 0x407, 0x4) 20:20:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'veth0_to_team\x00'}) sendmsg$nl_route_sched(r0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) close(r1) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x8000000009) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x8000fffffffe) 20:20:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r1 = socket$unix(0x1, 0xfffffffffffffffe, 0x0) bind$unix(r1, &(0x7f0000000180)=@abs={0x1}, 0x6e) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f000053c000)=[@rights={0x18, 0x1, 0x1, [r2]}], 0x18}, 0x0) close(r2) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BINDER_THREAD_EXIT(r4, 0x40046208, 0x0) connect$unix(r3, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 20:20:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xa, 0x0, &(0x7f0000000000)=0x9b) 20:20:23 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="016cf93a175e00000000000086dd60d8652b01000600fe8000000000004000000000000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 20:20:23 executing program 2: syz_open_procfs(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x9) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)={@mcast1}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4e000600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r2 = creat(0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) getsockopt$sock_buf(r3, 0x1, 0x1a, 0x0, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) lseek(r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) munlockall() connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x11) sendmmsg(r5, &(0x7f000000ac80), 0x66, 0x0) 20:20:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x800, 0x1, 0x0, 0x5}, {0x80000000, 0x0, 0x1ff}, {0xffff, 0x2, 0xfffffffffffffffc, 0x18c}, {0x7, 0x280000000000, 0x1, 0x9}, {0x1, 0x80000000, 0x9, 0x4}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1400000000000000290000003e00000000000000"], 0x14}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c83115ab7, 0x0) 20:20:23 executing program 4: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000ac0)=0xda5b, 0x3) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/checkreqprot\x00', 0x2000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000a80)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000d00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x40400}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c00)={0xbc, r3, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x1}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5f}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x8}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40000}, 0xc080) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000014, &(0x7f0000000040)=0x1, 0x225) sendmmsg(r1, &(0x7f0000002580)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000400)=@sco, 0x359, &(0x7f0000000a80), 0x26c, &(0x7f0000000c40)}}], 0x4000000000002f0, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) fstat(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) fstat(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) stat(0x0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getgid() lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="02000000010001000000000002000100", @ANYRES32=r4, @ANYBLOB="02000700", @ANYRES32=r5, @ANYBLOB="02000400", @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="02000300", @ANYRES32=r8, @ANYBLOB="02000600", @ANYRES32=r9, @ANYBLOB="02000200", @ANYRES32=r10, @ANYBLOB="02000100", @ANYRES32=r11, @ANYBLOB="040004000000000008000000", @ANYRES32=r12, @ANYBLOB="08000200", @ANYRES32=r13, @ANYBLOB="08090700b8706ed68d00b220a822a1c71702c6dc2b035c425313672ea110ba43bfeafaffffff8a7ba0f6f8d01fddd4c3a125bc56aac837c6ad90736e9127d9d0800707cf41680a8d9707baacdde3608122033e327f16ecc258e56cb74e7c571bd73e033026c7fc78d8a38f2b9e6c81", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r15, @ANYBLOB="10000000000000002000000000000000"], 0x84, 0x3) 20:20:23 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, 0x0}) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000000)=0x7) 20:20:24 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() wait4(r1, &(0x7f0000000000), 0x1, 0x0) clone(0x2106001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) 20:20:24 executing program 1: stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000500)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x800}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) getpid() r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) socket$nl_route(0x10, 0x3, 0x0) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) mknod$loop(&(0x7f0000000480)='./file0\x00', 0xc080, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) restart_syscall() 20:20:24 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0xc000000000, 0x0) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x40, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000180)={0x7, 0x1b, 0x1}, 0x7) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0xfffffffffffffdec, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000498000)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000000280)=ANY=[@ANYBLOB="20479ec85bc02ba40208f589b71600020008000102e200b9910500000012bdb7086ae70002e6a50a04f300000000000000000000b24feff24949ce4bc2c38791c1c72ff166f7f8527a0765e90584fe055362493e1d1bfa02e7dbfeeb125ee6196668d021a1fabc36ade41623899dde2e9945a63e9ba00e597ebca807101f040900000000000000"], 0x20}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) pause() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getpid() ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000000)=""/236) 20:20:24 executing program 5: ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x5}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x4000000000000000, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) socket$unix(0x1, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$netlink(r1, &(0x7f00000002c0)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000280)) socket$unix(0x1, 0x2, 0x0) fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, r3, 0x1400) 20:20:24 executing program 4: timerfd_create(0x0, 0x800) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000680)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) fcntl$setflags(r1, 0x2, 0x0) r4 = dup(r3) fsync(r0) syncfs(r1) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000540)={0x8, 0x3}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)=',apb0\x00', 0x10) io_setup(0x20, &(0x7f0000000300)=0x0) io_cancel(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x423, r4, &(0x7f00000005c0)="f2f42245d196f91a48f2b821d3442e277a43f0ca0ad8ed1b65a81f934bc9a4fdca52f744ec264514eba836b2ca9b2e580d83a0ab4e20c5f62b71ca27af042df6ea32", 0x42, 0xf, 0x0, 0x0, r4}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000001c0)={'veth1_to_team\x00', 0x200}) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x2f, &(0x7f0000000240)=0x80000200, 0x2e5) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r4, r6, 0x0, 0x8000fffffffe) 20:20:24 executing program 0: r0 = creat(&(0x7f00000003c0)='./bus\x00', 0x0) pwrite64(r0, &(0x7f0000001240)='{', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x4401) setsockopt$inet_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000000)=0x7, 0x4) io_setup(0x10b, &(0x7f0000000240)=0x0) io_submit(r1, 0x33, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000100)={0xf24, {{0xa, 0x4e23, 0x7fff, @local, 0x7fffffff}}, {{0xa, 0x4e22, 0x840000000000, @mcast1, 0x1}}}, 0xffd8) 20:20:25 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)="963e17f4", 0x4}], 0x1) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 20:20:25 executing program 5: pipe2(&(0x7f0000000040), 0x80800) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00\x9e\x9f#\xb1\x97=\xe3\x19\x1b+\xc6]L\x8bE\x06\xa7\xc6\xce\a\x95\xcd\xff%91\x06\x17\x89\xea\x8b\xabuZ\a\\\x18\x1e\x9c\x1e\x10\x1c\x9e', 0x26e1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$FICLONE(r1, 0x40049409, r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r2, 0x0, r4, 0x0, 0x400, 0x0) 20:20:25 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet(0x2, 0x805, 0x3) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:20:25 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000), 0x9140372d21bfc933) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_FP_MODE(0x2e) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) write$P9_RLOPEN(r2, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x4, 0x1}, 0x7fff}}, 0x18) perf_event_open(&(0x7f0000000080)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x11, r1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000100), 0xfffffdbc) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f00000002c0)=""/246) r6 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x103002, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000140)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) syz_genetlink_get_family_id$tipc2(0x0) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r5, r6, 0x0, 0x102002700) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000200), &(0x7f00000003c0)=0x4) 20:20:25 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) signalfd(r0, &(0x7f0000392ff8), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000580)) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0xe6, "c0922ece892f139fd94b2380c8821d96f8d9ac1d3bd51991f1c17d7eb08dd77bd6af16488763ca6e83c60681f23a654f8f002dc0a3c88bc3d47fb83cd14df82b6acfeef55327f5f44c8cebabb0ddf221ff66006f6e926525338b57439ade01a477438dad5abaaf4d1e21ad8697f6cee89506615ba3af4616cffda2337df2aa802fea985ddee4f11048b383e7c5a1188088d0c1ed84474c90881137973852894e45d4a61a241d047b8bdd63c0d87c26105dd9fe3c9e83e900211a1b508eb675e104d177b7d9ffdd4abe54e2b82b01cfc08118f0d33a8059fbc7548af33881b822ebb766f9979b"}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) sendfile(r2, r1, &(0x7f0000000100), 0x0) r3 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r3, &(0x7f000000cfe4), 0x1c) sendmmsg(r3, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[{0x60, 0x29, 0x3b, "e10984fa3279d7a9e03a22b169d736c06ab11a96f7d25adf9166e34ba01ef80187324065bcda06ab9013268169230973698dc95dde627650790df783841dcbb38ed04b54d5375b9d6a"}], 0x60}}], 0x1, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) close(r1) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000140)=0x7) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r6, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r6, 0x0) lseek(r5, 0x0, 0x1) sendfile(r6, r6, &(0x7f0000000340), 0x2000000020) sendfile(r6, r6, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 20:20:25 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f0000000000)={0x68267220}, 0x8, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f00000001c0)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000aeb530823c2ad4a3da2b10097222c86b2b2132bf97a62dc8d3c1ce714fb524e76898efc8159e01e83a08db7f4c2b05603bd953aef206cd0be377f80b195c37674179500da9a28fe5f15f6754a6245b3dfe57753fe8"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000600)='\x00'}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x4, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0, 0xfffffdfd, 0x0}) 20:20:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) fsync(r0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4160, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x204000, 0x2) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000080)={0xa39, {{0x2, 0x4e21, @multicast1}}}, 0x88) connect(r1, &(0x7f0000000140)=@pptp={0x18, 0x2, {0x3, @rand_addr=0x4}}, 0xfffffffffffffcef) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f00000001c0)="9b92a6458e5c95a847061c0484c3e763f1e06fb14e5783afa7a7f7d4dfdb62585d6725700c518c3f41311bb4e322a5e41c519bc21247dc20d59d4eb5d3e1c5fab057e4791a5e2e558e0b70027ef1bd6b77362d6de3cd8f53eaffd928cc6617a345cca455efcb8ccca7c2fc935e5c208446261ed3810097282354079fe246bed4f5586dcbbb82283c4f2578c6b10d0109983f57136750848bb0dacd9f9ebc112d35ab13eabe18b0e40c839f74bf396a8c8a9030c1039cbc9cc3cb043416554ce153c481b554d8fe089431") [ 1300.046564] kauditd_printk_skb: 186 callbacks suppressed [ 1300.046573] audit: type=1400 audit(1554668426.245:55071): avc: denied { map } for pid=29230 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x3fd, 0xad) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0xa4, 0x4) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) [ 1300.261491] audit: type=1400 audit(1554668426.255:55072): avc: denied { map } for pid=29230 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:26 executing program 4: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getitimer(0x1, &(0x7f0000000140)) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) gettid() add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b00", 0x4}], 0x1, 0x81806) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x5, 0xb, 0x16, 0x1, "10062028e3cf1614530ae34a7024042534a937b4b26e73b80b00d1d55795112f1c5fb744ecc913b5b021b5df8ba00263d10285edfcbd9a93b9ae3e3db2f1675f", "fe5748d44c6bae0121e03b2392c1cd60288a5dd0b417cee8f287d0ddbe44acdd", [0xffff, 0x2a8]}) sendfile(r1, r2, 0x0, 0x2000006) memfd_create(&(0x7f0000001540)='Q\x00', 0x2) getdents64(0xffffffffffffffff, &(0x7f0000000500)=""/4096, 0x1000) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x4) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000000)={0x400, 0x9, 0x4, 0x5, "3e9ac5179d7e9e6b19d24a6dbb66e9b634aea98e0781ec8b2f7e3a18a27abf20"}) gettid() 20:20:26 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r1, 0x2) flock(r0, 0x1) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x5, 0x20011, r1, 0x0) close(r0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f0000000040)={0x5, {{0xa, 0x4e23, 0x1000, @ipv4={[], [], @local}}}, {{0xa, 0x4e22, 0x0, @mcast2, 0x40}}}, 0x108) ioctl$RTC_PIE_ON(r1, 0x7005) connect$netlink(r1, &(0x7f0000000180)=@proc={0x10, 0x0, 0x25dfdbfb, 0xb408840}, 0xc) r2 = getpgid(0x0) tkill(r2, 0x3f) [ 1300.500086] audit: type=1400 audit(1554668426.275:55073): avc: denied { map } for pid=29226 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) setpriority(0x2, r0, 0x1ff) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) gettid() write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1300.599298] audit: type=1400 audit(1554668426.275:55074): avc: denied { map } for pid=29226 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1300.731712] audit: type=1400 audit(1554668426.305:55076): avc: denied { map } for pid=29230 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1300.818893] audit: type=1400 audit(1554668426.275:55075): avc: denied { create } for pid=29229 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1300.910632] audit: type=1400 audit(1554668426.315:55077): avc: denied { map } for pid=29230 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1301.051521] audit: type=1400 audit(1554668426.325:55078): avc: denied { ioctl } for pid=29229 comm="syz-executor.1" path="socket:[56150]" dev="sockfs" ino=56150 ioctlcmd=0x6614 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 20:20:27 executing program 5: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbf) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) setresuid(0x0, r1, r1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) 20:20:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = getgid() setregid(r3, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) sched_setattr(0x0, &(0x7f0000000080), 0x0) recvfrom(r1, &(0x7f00000004c0)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcec) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x3, 0x3c8, [0x0, 0x20000580, 0x200007b0, 0x200007e0], 0x0, &(0x7f0000000140), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x8, 0x89ff, 'team_slave_0\x00', 'sit0\x00', 'syzkaller1\x00', 'veth1_to_team\x00', @local, [0xff, 0x0, 0xff, 0xedd36509a9a76fa1, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0x110, 0x110, 0x140, [@helper={'helper\x00', 0x28, {{0x0, 'sip-20000\x00'}}}, @helper={'helper\x00', 0x28, {{0x0, 'RAS\x00'}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7d}}}}, {{{0x5, 0x40, 0x600, 'vcan0\x00', 'ip6gre0\x00', 'ip6_vti0\x00', 'veth1_to_team\x00', @local, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x1, 0x9}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x4, 0x6001, 'ip6erspan0\x00', 'lo\x00', 'nr0\x00', 'bridge_slave_0\x00', @empty, [0x0, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x16}, [0xff, 0x0, 0xff, 0x0, 0xff], 0xa8, 0xd8, 0x108, [@cluster={'cluster\x00', 0x10, {{0xffffffff, 0x1000, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}]}, @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}}]}]}, 0x440) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 1301.188583] audit: type=1400 audit(1554668426.365:55079): avc: denied { map } for pid=29235 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1301.284737] audit: audit_backlog=65 > audit_backlog_limit=64 20:20:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e24, 0x7, @mcast2, 0x4}}, 0x0, 0x400, 0x0, "b959538fa26f968d59bcaedebf0a80be64dbb068bb21802727f379f16bdbc2187804f8910c9867f5bc340b601ca5ae00a21a56e50ce823864db373a7338ea1ec220e8d46ff4f173bfdb9adbbfe71c1da"}, 0xd8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000140)='./file0\x00', 0x2000, 0x16) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f0000000180)={0x80000008}) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x399}], 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r4, &(0x7f0000000100), 0x2df, 0x80000000000) 20:20:28 executing program 2: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={r2, 0xc366, 0x4}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d726177206861735265b878683d73686133ffff31322d00"/81], &(0x7f0000000200)="a38a4c1169ac9d06b6c0da7e4d6a339d96b9de91370a005ad5bf8ef7bba8e35e6ec671091b2a84f48978fdb4f07dec62b09c64febe914177fd11fdcffd78fd03735f2181085c2aef49c34e074ed7c32240ae70762b4b2c98ad24b11164a2e4aa07dca8ea1a5b25cd983f4724b095b44ede42fbced8102ff01cb89b8ef222792ffc84aed9a93432b63a9a1ed9071b9a13f0782e337ac7a004768ab0da797a9a7d1a42582b9b552369eab7b88bea04cf67b93bd4e5834b1c1d810a848643e7f9882ca19cb870bab9e5e8da3e3486b8b23105356c9535bfdb6672d77445da5bd678", &(0x7f0000000300)="b62522b4385c96243b9571d6a8d247296925b148d4c49ad4a8d27cd0212967b047d82cb8a40c297def6969795d98617bd0e15af39d6d18030f8a22ad3eb3623eada86f498dc747f9093e5bd54736ed828da07c19d12980d7a251") setsockopt(r1, 0x0, 0x1, 0x0, 0x0) 20:20:28 executing program 1: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") fcntl$setstatus(r0, 0x4, 0x4bff) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000140)=""/175, &(0x7f00000000c0)=0xaf) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000000)=""/51, &(0x7f0000000080)=0x33) io_setup(0x1, &(0x7f00000002c0)=0x0) fallocate(r0, 0x1, 0x7fffffff, 0x100000000) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200), 0xfffffd07}]) 20:20:28 executing program 3: mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='posix_acl_accesswlan0keyring/nodev#*md5sumcgroup\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101802, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000080)=""/246) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x141801, 0x0) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$ppp(r0, 0x0, 0x0) 20:20:28 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @local}, 0x10) write$P9_RSTATu(r1, &(0x7f0000000580)={0x52, 0x7d, 0x0, {{0x0, 0x3d, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2, '!,', 0x8, 'vboxnet0'}}}, 0x52) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x83, 0x4) sendto$inet(r1, &(0x7f0000000200)="96", 0x1, 0x3fff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000140)={0x0, 0xffffffffffffff0d, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000007a00)={0x0, 0x0, &(0x7f00000079c0)={&(0x7f0000007440)={0x14}, 0x14}}, 0x4000080) recvmmsg(r1, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/236, 0xec}], 0x1}, 0xffff}], 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) sendto$unix(r1, &(0x7f00000004c0)="88", 0x1, 0x81, 0x0, 0x0) 20:20:28 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) futex(&(0x7f000000cffc), 0xc, 0x0, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="a81ec7e7a7f04d7ecf37961267075f48c56bc65f36e828984d94f54f8f52dd1c9ce2b3996c24ff1d286c956983fc51b2723ec8a30c3f1d3914f5e6f9c2676a1e990c30c07b749b6f2fd54d63cd18b770957b2bee03ae73c41de1e473946091388c7c0f4e04e41349fb7f1e92e0652f98bd8201ef93a6fb02f92373e1b502c6274e0d164b251634ea3b5db18e79eedddd900d4991cfb2f4107f0066e396cad4", 0x9f, 0xfffffffffffffffb) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, 0xbf, 0xb796, 0x0, 0x1f, 0x5, 0x3, 0x100000000, 0x0, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x101, 0x4, 0x2, 0x3, 0x5, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x1, 0xda3, 0x80000000, 0x5, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x9) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x2, 0x0, 0x0, 0x9917, 0xffff}, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000040)={0x0, 0x0}) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x82) prlimit64(r4, 0x6, 0x0, &(0x7f0000000080)) r6 = creat(&(0x7f0000000380)='./file0\x00', 0x120) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) fallocate(r0, 0x0, 0x7fff, 0x0) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f0000000700)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) keyctl$get_persistent(0x16, r7, 0x0) openat$cgroup_type(r5, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) fallocate(r6, 0x3, 0x5e89, 0xfff9) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1d0) unshare(0x40000000) getcwd(&(0x7f00000001c0)=""/103, 0x67) 20:20:29 executing program 0: r0 = creat(&(0x7f00000010c0)='./file0\x00', 0x7) write$binfmt_script(r0, &(0x7f0000000400)={'#! ', './file0'}, 0xb) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000002300)={0x1250, 0x12, 0xd, 0x100, 0x70bd25, 0x25dfdbfd, {0xa, 0x0, 0x8}, [@generic="cdea77432689fa2ce5265ad9485dd392abbae96fe0729083f5b65df617068a6ec40fd74174ed50c7371495f432f8be839abf79ed4829ed88287d7e1b81d6fa1950815c5fd6e355da16c5bb742367e68b9d1e83026da542bb221988b38d719e0deffb6d16ee42845ca148b0d0a755eeb84530cc78b1caf79c74a7719330374bdef7ece798ce8cdb1c0fae95b7c75672b16513aa9914abc97f6615fa80cad2483bee5cf86377156a410adedfed0218c00a7f233b16cf73c6eeea72a300aa7f4e", @generic="0aa1465b7b9610189dddd144e52a1897252e03cc9a7d6ca0bc3cf8aaaa553b9833551783ee9796f1aa5cbf1d30913274f3433a17b79a010819ea6ef413873c9183bbd2076e55560518c2ac4686c8dbd4aaa9d22654068c25362769017be16ac44ff4a4ace43855b34e03ee1547518c4d9f79913377d7a8242de88fcd37c3caaba2b4cae993c8f898707fe6c3959c9eed140f714ee31fdece185c81e8eb76bea0e44c0fb1c2d0fb43611c1d1e877b1ff13224e56433", @nested={0xc, 0xe, [@typed={0x8, 0x2, @fd=r1}]}, @generic="0d922c6f5a3d645cee9abffdbaa541c921aa86756e57cf997487809e5ed929e2bf213903fcbdfc0cf2052c95e346972a29b08ecd3012e4d973b318c6cd1a5d513712eae0b091960324c3e80e44ab86fe888a51cd5b1661a39f9c1f0fdd0b69f5744cf25cefa39bf57faf4603b89e29168ca470a8306c48d737ece5f73d6d2f23334507b5ff20a8ad977a24dd754a4ce32c59fb73a5f0b8bae4d0301cc3daf7dbdf0928ced4cd47a3c8269f60f41822ff91fe1879911b0dad32e6", @generic="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"]}, 0x1250}, 0x1, 0x0, 0x0, 0x20004881}, 0x40005) write$P9_RSTATFS(r0, &(0x7f0000000100)={0x43, 0x9, 0x1, {0x401, 0x8, 0x2f1, 0x83, 0x2, 0x9, 0x0, 0x0, 0xbde}}, 0x43) close(r0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000001b00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac'], &(0x7f0000001ac0)=[&(0x7f0000002100)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000e40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000840)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xee\x86T\xd4\b\"\xa8\x19\x8a\xf8\xcc+\xdc\xfa\xce\xdb1\b\xfb_\xcd\x8crR*UN\xee6\xb2\xdcN\x97\xb3\xce\xac\xf0\xeav\xb6~\x82\x199\xed\xd4\xc1\xa8\xd1\xdd9\xf9\xc1\xa9\x01\x80\xb2\x90Bn\xf7\xa1\xd1\xf3\xfc%\x1a\x9a\xe2\x8a\xb3yC:\xb3\xbf\xc4\xbe\x8e\x10.\xa8\xef,~\x99Fg\x86\x8e\xb8\xeb/\xfe\x87\x89s\xf5\x80\x95\xa3\x87G\xc6\x00z\xe0;\xe9\xfcg\"i\x8a.L1\x03_^%\x11F\xb6\x89\xadm\x06\x1c\xdez\xb1\xb09\xc7\x85\xf5\x93\v\xc3\xdd\xa1{?\x85\xa5\xca>\x06\xa1\xda\xea\xb4\xa1\x90}\xdex`\xa1\xb0_\x11U\xa7\x8e\xc2\x1a(\nj1\xef\xbc\xd6\xffH\x83\xbd\xbe\xff\xc7W\xed\xfbHBv\xd8\xae\xad\x9ec2\x8d\xf7\xc6\x195\xb8\xa0:\xbco`_\x1f\x81\xe1 \xa9\xc4\xf4\x000\xd1^hN\x00HW-\xc0X\xb6\xc5\xe2R>W\xea\xbf\xd8\x8a\xc7\xfd\xb6|\xae-\xf0\x1e\v\x8d\xb9IB\x8a\x00', &(0x7f0000001280)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a', &(0x7f0000000180)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a', &(0x7f0000001680)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000640)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90y\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\xfd\x05F\xad\x8c\xa4\xcf\xf6o;o\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1d}\x9d\xe9\xfa\xf2\x957\x9d;\xe4\xb4\x86&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\ra\xad\"\x11\x99z\"\xaa\xc7\xec\f\xfep\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc5t\xd9\xc8\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6\x8bG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R']) 20:20:29 executing program 3: pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000000000a0002, 0x0) fdatasync(r1) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x584c07d9, &(0x7f0000000980), 0x100000000000008a, 0x0, 0xfffffffffffffe03}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r3, &(0x7f0000000440)=""/46, 0x2e) r4 = socket$inet6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000d2c000/0x3000)=nil, 0x3000, &(0x7f0000000480)=""/4096) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a60000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000aa8000/0x2000)=nil) munlockall() r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r5, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket(0xa, 0x1, 0x0) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000001a80)={{{@in6=@ipv4={[], [], @broadcast}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000001b80)=0xe8) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r7}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000240)={0x7, 0x5}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000000080)={@rand_addr="8b0cad0fa19c999dc4a1d21c82eb93c0", @remote, @mcast2, 0xf5d, 0x4, 0x0, 0x0, 0x0, 0x20000, r8}) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000300)) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000002c0)={@remote, 0x39, r8}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000000180)={@mcast2, @mcast1, @loopback, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffb8fa, 0x83420004, r8}) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f00000003c0)=0xcd) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000008c0), 0x0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"/796]) r9 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r9, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) 20:20:29 executing program 1: r0 = creat(&(0x7f0000000580)='./file0\x00', 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x6, 0xfffffffffffff800, 0x0, 0x9}) setresuid(0x0, 0x0, 0x0) setregid(0x0, r1) 20:20:29 executing program 2: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x28) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="052f3f24c1dc0000000000000000ef3bd4778002a5d3e425cdb6b960b174950500000000000000cff6010000000000000000000000000000ff"], 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) write$P9_RSTATu(r2, &(0x7f0000000440)={0x87, 0x7d, 0x2, {{0x0, 0x5d, 0x2, 0x8, {0x0, 0x0, 0x3}, 0x4140000, 0x6, 0x7, 0x3ff, 0x1, '-', 0x9, 'bdeveth1/', 0x1, '}', 0x1f, '}ppp0#lovboxnet0tem0user/\xf1.ppp0'}, 0x15, '-bdevkeyringcgroup]&[', r3, r4, r5}}, 0x87) rt_sigprocmask(0x0, &(0x7f0000000000)={0xf2e}, 0x0, 0x8) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r1, 0x0, 0x0) 20:20:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000140)=""/4096) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000001140)={'syz', 0x2}, &(0x7f0000001180)="f0aa3b321e61772cbe5e9c3801641086", 0x10, 0xfffffffffffffff8) keyctl$link(0x8, r1, r2) 20:20:30 executing program 4: exit(0x0) r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'security\x00'}, &(0x7f00000000c0)=0x54) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 20:20:30 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r3, 0x0, 0x1000) r4 = memfd_create(&(0x7f0000000000)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x2) gettid() openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ftruncate(r4, 0x40001) sendfile(r2, r4, 0x0, 0x100000000002) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r5 = creat(&(0x7f0000000200)='./file0\x00', 0x20) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r5, 0x10, &(0x7f00000002c0)={&(0x7f0000000340)=""/128, 0x80, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=r6, 0x4) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000280)=0x5) fcntl$addseals(r4, 0x409, 0x8) pipe2(&(0x7f00000000c0), 0x4000) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r7, &(0x7f0000000080)='./file0\x00') dup2(r4, r3) 20:20:30 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setrlimit(0x7, &(0x7f0000000140)) open(&(0x7f0000000000)='./file0\x00', 0x181880, 0x2) dup(r0) 20:20:30 executing program 2: pipe(&(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000140), 0x4) recvmmsg(r1, &(0x7f0000002bc0), 0x40000000000018f, 0x0, 0x0) write(r0, &(0x7f0000000000)='\a', 0x1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCCONS(r2, 0x541d) unshare(0x20600) pselect6(0x40, &(0x7f00000000c0)={0x1}, 0x0, 0x0, 0x0, 0x0) 20:20:30 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x100, &(0x7f0000000080)={@dev={[], 0x22}, @link_local, [{[{0x9100, 0x1, 0x7, 0x4}], {0x8100, 0x4, 0xfffffffffffffff9, 0x2}}], {@generic={0x16, "f01e51b2b085140a321d866edd29908c4d417cedb8ddcfaf6fd9379acebf540abc86194ead21c458143d5d2771d0e80107dcd82158986007fa2e28c5a2417b73b5a7458db0bea1981c6d7d77873063643bc43a6bcce74b2194bf19a13268de44fc9d52fd50a67d86832f72f419344783d335cbe9194bfaa66159ca6bce2097572530795332833695b6b024cb1b335e076dd8829d06e2d75717f6da80bc4509a57dbd6ae7752908997d8301e22196689aee38cfc09ff00691999445b31911aff2c9fd21bca1c1014b8e21b4bbb67e4d334966ca748c0f8a7c60739c17e7faae892184c990c9552f6f6e40"}}}, &(0x7f0000000200)={0x0, 0x3, [0xd0f, 0x27c, 0x18d, 0x77b]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0xfffffc82, &(0x7f00000003c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 20:20:30 executing program 1: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x2, [@multicast1, @empty]}, 0x1c0) 20:20:31 executing program 3: r0 = socket$packet(0x11, 0x400000000a, 0x300) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') close(r0) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xffffffea) r4 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) link(0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) fstat(r0, &(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000140)=0x4) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000100)) 20:20:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000000c0)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d0030c9c9c9625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") 20:20:31 executing program 4: r0 = socket$inet(0x10, 0x6, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000280007021dfffd946fa2830020200a00050000000003fffffffffffff000ff7e", 0x24}], 0x1}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x20000, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x685) ftruncate(r1, 0xfffffffffffffffb) 20:20:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @loopback, @dev}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@local, @loopback}, 0xffffffffffffff40) 20:20:31 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000300)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) 20:20:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0xce, 0x80000) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f00000001c0)={0x3ff, 0x100, 0x200, 0x2, 0x1, 0xf08}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) rt_sigpending(&(0x7f0000000000), 0x8) syz_open_pts(r0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000280)={{0x0, 0x3}, 0x800}) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() sched_rr_get_interval(r5, &(0x7f0000000080)) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 1305.505551] kauditd_printk_skb: 324 callbacks suppressed [ 1305.505559] audit: type=1400 audit(1554668431.705:55390): avc: denied { map } for pid=29387 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1305.662288] audit: type=1400 audit(1554668431.715:55391): avc: denied { map } for pid=29388 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:32 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/nfsfs\x00') mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x44) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mlockall(0x7) [ 1305.846912] audit: type=1400 audit(1554668431.715:55392): avc: denied { map } for pid=29388 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:32 executing program 2: creat(&(0x7f0000000240)='./bus\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x6) fchmodat(r0, &(0x7f0000000000)='./bus\x00', 0x101) [ 1305.997488] audit: type=1400 audit(1554668431.755:55393): avc: denied { map } for pid=29387 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:32 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x3e, &(0x7f0000000000)=0x6, 0x4) sendto(r1, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) setsockopt$inet6_int(r1, 0x29, 0x7f, &(0x7f0000000080)=0x3e83a72e, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) [ 1306.152357] audit: type=1400 audit(1554668431.765:55394): avc: denied { map } for pid=29388 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:32 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781221f20000c46f0006000000070000003c9f0300000000000000c27ed0e81f00030000000000000067681bfd070000000000000000fb6c7a2ce29af905000000002100000000004314524ade761922"], 0x5f) [ 1306.273743] audit: type=1400 audit(1554668431.765:55395): avc: denied { map } for pid=29388 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000014, &(0x7f0000000580)=0x100000001, 0xfffffd5d) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000040)=0x80000000001, 0x4) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendto$packet(r1, &(0x7f0000001200)="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", 0x6c1, 0x0, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000280)={r2, 0x1, 0x6, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) io_setup(0x4, &(0x7f00000001c0)=0x0) r4 = fcntl$dupfd(r1, 0x0, r0) sendmsg$nl_generic(r4, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80001040}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0xd8, 0x21, 0x5a0, 0x70bd29, 0x27dfdbff, {0x14}, [@typed={0x8, 0x86, @fd=r4}, @generic="563d0e27268a0872dbfccc8b38c04dc2c0197827005a446c39d2465e28580f191b0e8488224d69472f9bb34fd82d2a26f7a341008e688d39a1388f4931fe157b2ecc6f27bf30dd3d18fd10bc9b283d3fc9a45bd3bc2dc573fe3765fa00370f646b98a6", @typed={0x10, 0x78, @str='@trusted*\x00'}, @nested={0x40, 0x3f, [@generic="a317c213f93391a8dc96368d008597e61a52b70ae4dd1a6d6dd90cbba693df9c97f1", @generic="75ebaa2486d237b8e3345ba77973ffc7b1e40a51f3afa2e34a13"]}, @typed={0x8, 0x77, @ipv4=@multicast2}]}, 0xd8}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) io_submit(r3, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000180)="df", 0x1}]) [ 1306.438431] audit: type=1400 audit(1554668431.765:55396): avc: denied { map } for pid=29387 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1306.564549] audit: type=1400 audit(1554668431.775:55397): avc: denied { map } for pid=29387 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:32 executing program 2: mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x4000000080000005) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0xa400295c) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x4080, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) [ 1306.687236] audit: type=1400 audit(1554668431.805:55398): avc: denied { map } for pid=29388 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1306.722409] audit: audit_backlog=65 > audit_backlog_limit=64 20:20:33 executing program 3: syz_emit_ethernet(0x2fe, &(0x7f0000000180)={@remote, @link_local, [{[], {0x8100, 0x8, 0x9, 0x2}}], {@generic={0xd, "5b5288347dac65b242b0532f2745e1879d5200edd1a9812955217a3854a80083c824"}}}, 0x0) 20:20:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000001c0)=@generic={0x2, 0x0, 0x8}) r1 = dup2(r0, r0) getdents(r1, &(0x7f0000000180)=""/61, 0x3d) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') ioctl$TIOCNXCL(r2, 0x540d) connect$inet6(r0, &(0x7f0000000080), 0x1c) r3 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x108}, 0x10) write$P9_RLOCK(r2, &(0x7f0000000000)={0x8, 0x35, 0x1, 0x1}, 0x8) ptrace$pokeuser(0x6, r4, 0x1, 0x1) ptrace$setopts(0x4206, r4, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) tkill(r4, 0x6) fcntl$setstatus(r0, 0x4, 0x42803) write$binfmt_elf32(r3, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x4, 0x7, 0x2, 0x4, 0x3, 0x6, 0x0, 0x2dc, 0x38, 0x45, 0xc7, 0x9, 0x20, 0x2, 0x2, 0xd8b4, 0x3}, [{0x70000000, 0x6, 0x1, 0x10001, 0xfff, 0x4, 0x70}, {0x70000000, 0x6, 0x5, 0xed34, 0x729e8a56, 0x4, 0x2a57, 0x1f}], "427c328731dc05b0bbaaa7204f25d2ffcd12d399cfa9ee151522ca89d1953f6ce5a9e02f8dfa93088a63f63f54e1af45e1a94f1067c0649869a55b42d808615cac76452698d7e30f5ff11ec3bee3680b3d1290faf59b11ee7e7e7a0a2c541a79cdb932dcacc11da7035d362111b3e650205b839d4cd8c03f49ffc6c32a2f39d299c0ee76b6d8e246193d6d045d7b98dd741868e2ec3da73bc7f47541b9c5ca342e23a558fdfa7f751a18e2fb65522a9ed8021170e9963c0fdef925", [[], [], [], [], [], [], [], []]}, 0x933) 20:20:33 executing program 4: clone(0xbffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0xfb}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) wait4(0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0xe) 20:20:33 executing program 0: clone(0x800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pipe(&(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregset(0x4205, r0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)="549fc118eb104e326e4aa163e0cbdd03d6b6dc041a6b541f8e1354334ea5760e6438afed5cae892e0d057632dec9d057ac0d4032182b595b80a761810a1a072afccd99df7c90a4305377dbba8140b144e93c6c536b429b3a10a876e19d9dad15df09c2d28488a6553b6a01a0fce42718970a501dcafae72885f6d88538dded018afee8c33ea96cdd64972a2b25fcd9f23f756b10", 0x94}) tkill(r0, 0x3b) 20:20:33 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaae3f000000000000450c96f385000000000690780000dc0c0000000000000000000401907800c8d1f6ff071ccdc1188f86"], 0x0) 20:20:33 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) unshare(0x20600) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)=0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0x0, 0xc6, 0x7, 0x7, 0xfffffffffffffffa, 0x104, 0x7ff, 0x2, 0x0, 0x9, 0x4, 0x1f9, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x804, 0x10001, 0x0, 0x7fffffff, 0x5, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x7f}, 0x4080, 0xfffffffffffffffb, 0xfffffffffffffffa, 0xb, 0x8000, 0x0, 0xd}, r1, 0xf, r0, 0x2) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000240)=""/218, 0xda, 0x122, &(0x7f0000000340)={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0xa}, 0x401}, 0x1c) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80005, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 20:20:33 executing program 2: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000240)=0x1c, 0x80000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000280)={@empty, 0x56e, 0x1, 0x1, 0xe, 0x1, 0x620a}, 0x20) setresuid(0x0, 0xee01, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x1f6) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000300)={0x2}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x2) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000340)=ANY=[@ANYBLOB="af0800000035369e7424958966cf56f11daf28a3ce00000003226d7a5e7cb1ce56cb962a44f67146f9ac1c5983ab3c3fcb898f2a1a16c91b544e8d1bfcbd6f8bbc407e377856c9e483df91d3457965175fb8e990448d54e06f467a5109d613688cfe90de821f0b9fbd43de2a68021e2115d748d96420d309caa20e36f0868f90bb0b9f2f7371578309ef4c987779c8ac68fa416c9c571584f55124c94b6beba51e03b6a1f4e0f591e65f9e26de2f04ba127f4f259400db"], 0x8) fcntl$setownex(r3, 0xf, &(0x7f0000000100)={0x1, r4}) mknod(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) getcwd(&(0x7f0000000180)=""/42, 0x2a) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) [ 1307.449270] EXT4-fs warning (device sda1): ext4_resize_begin:45: There are errors in the filesystem, so online resizing is not allowed 20:20:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000001740)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x6a, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'veth0_to_hsr\x00'}) r1 = open(&(0x7f0000000180)='./file0\x00', 0x80, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x6, 0x100000001, 0x7fffffff}) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') r5 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000380)=""/110) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r5) ftruncate(r5, 0x2007fff) sendfile(r3, r5, 0x0, 0x8000fffffffe) prctl$PR_SET_TIMERSLACK(0x1d, 0xffffffffffffafea) futex(&(0x7f000000cffc)=0x100000000000004, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400}, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000001f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001f80)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000001fc0)={@local, 0x30, r6}) add_key(0x0, &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0x0) r7 = add_key$user(&(0x7f00000015c0)='user\x00', 0x0, &(0x7f0000001640), 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r7) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10401408}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYRESDEC=r2, @ANYRESOCT=r1, @ANYBLOB="d1ccb89c752e32299f315dd4c326894cdfcedb901ae1a2aa17fcd46e9e876691ca2905d4db82bc3f00fdfbf6fcb58ba7281b9d5e63c869ce95943247b99bcc6cf5161e64de02eb6515b4d3a8d7cdbd3c41f019014ae57314e00a524c7698493abe91be3eabb58aea2511d61594145b486ce7635a906dd72041f851fa8536fffe18745411d066e50225c6bbc8153001d371233f346413"], 0x3}}, 0x20000000) 20:20:33 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000080)='syz0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80}], 0x1, 0x0, 0x0) r1 = creat(0x0, 0x0) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='status\x00') preadv(r2, &(0x7f00000017c0), 0x1be, 0x0) 20:20:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r2, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) creat(&(0x7f0000000200)='./bus\x00', 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140)) ioprio_set$uid(0x0, 0x0, 0x8) 20:20:34 executing program 3: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="2f052fc754756cec6e3d2cd0a67755c5a54c9136a3ad3c8ebf9d271e2487c6283becb227943a0c96d200"/57], 0x39) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'veth1\x00', {0x2, 0x4e20, @local}}) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f00000000c0)) syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "cb039d", 0x14, 0x0, 0x0, @empty, @ipv4={[], [], @dev}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) 20:20:34 executing program 1: syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000040)=0x5) 20:20:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000180)) clone(0x308000, &(0x7f00000001c0)="e4a8e19d64f9968bebf71c0688ebc800b5c999374c2c748587ae0a585d167abe56d3fb94532433ee6b5916ad82d1eeeb51bcbdd554764febd04202460d42c86a392442eb25296bbaf9ea65197e63e07eb7ca71a9494674f3acd41834c31b9af3c9c941565d0f1f099074af3e1c8ad65fe5eff994660d23e71c077a597db696812bb119d94e1bdfd9a1d4021b511ddca9febc9bd13669b2a033c2a365e3667f", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000280)="fd515c16ffe625608db9d790486a954a637914c1da7fc3e4a4ce5eb81bc465a42e3662ab596cc183635937585026d44d854767d6a4bc777ff24788655d8576581c447f26492217b88ba6f817aa67cde9aa3d96557b9c771434891a2899ab803ccc4dacea62743d48466452d6489caa1e8c912a5f1bcfe7d81e6472d3deb17b5c16015e31dd9a8d49f4dfde5afb5c7055cdabbf9a0035349f4a93a5") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f00000000c0)={0x20000300}) 20:20:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x3}, 0x58) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x7, 0x4) 20:20:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000400)={'syzkaller1\x00', 0x8c5}) r2 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x800) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000100)=""/42) setxattr$trusted_overlay_nlink(&(0x7f0000000980)='./file0/../file0\x00', &(0x7f00000009c0)='trusted.overlay.nlink\x00', &(0x7f0000000a00)={'U-', 0xfffffffffffffff7}, 0x28, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000000500)=[{{&(0x7f00000002c0)=@ipx, 0x80, &(0x7f0000000180)=[{&(0x7f0000000340)=""/154, 0x9a}], 0x1, &(0x7f0000000800)=""/205, 0xcd}, 0x8}], 0x1, 0x20, &(0x7f0000000900)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000940)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x0, 0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000a40)='./file0/bus\x00', 0x40c2, 0x0) 20:20:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syncfs(r0) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x40, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2a}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r1, 0x0, 0x0) 20:20:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x24, 0x0, 0x1e7) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x5, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000080)=0x6) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'veth0\x00', 0x8000}) 20:20:36 executing program 1: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) clone(0x2302001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000080000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) tkill(r0, 0x3f) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x200020000009, 0x0, 0xa4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) timer_create(0x2, &(0x7f0000000080)={0x0, 0x8, 0x2, @thr={&(0x7f0000000140)="84b511ffb2c23a3926c301d93793eebf0df2d526b193ffc1c26a825621eb6f63117adb7291dec9e6e5559ab10fb89488ba40bb6d8542c3517ee74a3b74e37089c80ac0779f2f9fa6ea27277196477c387c092358b0fb5d391b3fa35d388aefc3f61424029831f79a0b416e5ad91d615fb03f152472b5baa732b466978123afc576c7f97f03231b7bee682cb4a5429148b82ba913c579505272ae514a38363cca700e52470a2b19d0bffd5d8709a8bbf7e308c306", &(0x7f0000000200)="38c3631b1cb989fb4abe596fa725fddbd92b23d15fde8356b64567c8b9d4c45940eab033260043fced8dc638815dc8b4c403a6efaa92e938115085b5db890b0dec42f668b0e20128ad8f9f8d31a399e1e428eaae2de58f4fcd33e79690b77c34e3826d38f4850bac2282298cc8f07bd4561fd18a8be6959bae809b513b5781d85d4cf27981cd1733ed0571d73d99365b9ca099c724dc48e68cdbe5e76a765bca71dd54"}}, &(0x7f00000002c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:20:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x80800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x3, 0x20) ptrace(0x4207, r2) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/216, 0xd8}, {&(0x7f0000000240)=""/132, 0x84}, {&(0x7f0000000300)=""/130, 0x82}, {&(0x7f00000003c0)=""/211, 0xd3}], 0x4, 0x61) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x8001}) ptrace$setregset(0x4209, r2, 0x20000004, &(0x7f0000000040)={0x0}) 20:20:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x102f9) accept4(r3, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f00000001c0)=0x80, 0x80800) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) sched_getparam(r4, &(0x7f0000000140)) r5 = dup2(r3, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r2, &(0x7f00000002c0)="dfe534feff20927a452493b7c184a17eaff21398f24d33729d845ebe362796be9add04087a4cd63f7a5f1fd67a9a712d30d511937af41bdb80bd45057691050596fd2b25abe36dc9849e4ce6e6d0bb6e50d811f5c8b78fd9c0288f62b7d3be02be48fd9556b01f31325951ef832d04336325bc855bc09661c97397690f32ab955d1b92589c4fd4209caa067d7e5b8f6190b114b7d4502baa3d891e9a84351b8dab18806f5f93c07ceff696b6ff38c549134aa267625293dda690f9cdd7af27134e72f6959f484f9b", &(0x7f00000003c0)=""/215}, 0x18) setsockopt$inet6_group_source_req(r3, 0x29, 0x2000000002b, 0x0, 0x0) ptrace$setopts(0x4206, r6, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x2, &(0x7f00000001c0), &(0x7f0000000200)) tkill(r6, 0x3c) fcntl$setstatus(r3, 0x4, 0x42800) 20:20:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x882, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e22, @local}}, 0x0, 0x3, 0x0, "4a8fd1a8fc76b739ee3b5af6758899b69a738f53b31f27ec07b9da6d5bc8148d3bb6629a4a60914ed7790891304045290390967fba523f3244537462be0d06ea48b33652c57bab0d75bd420ff9a82844"}, 0xd8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) pipe(&(0x7f0000000080)) syz_open_procfs(r2, &(0x7f0000000040)='net/udp\x00') write(r0, &(0x7f0000000040), 0x56ff3416) [ 1310.638655] SELinux: duplicate or incompatible mount options [ 1310.645286] kauditd_printk_skb: 168 callbacks suppressed [ 1310.645294] audit: type=1400 audit(1554668436.835:55565): avc: denied { map } for pid=29532 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1310.760572] audit: type=1400 audit(1554668436.855:55566): avc: denied { map } for pid=29532 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1310.870260] audit: type=1400 audit(1554668436.885:55567): avc: denied { map } for pid=29532 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:37 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{0x77359400}}, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, &(0x7f0000000340)) socket$packet(0x11, 0x0, 0x300) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x2) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) symlink(0x0, 0x0) [ 1310.986258] audit: type=1400 audit(1554668436.895:55568): avc: denied { map } for pid=29532 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:37 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$int_out(r0, 0x80804522, &(0x7f0000000080)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) [ 1311.090323] audit: type=1400 audit(1554668436.925:55569): avc: denied { map } for pid=29532 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1311.130289] audit: type=1400 audit(1554668436.945:55570): avc: denied { prog_load } for pid=29510 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1311.205371] audit: type=1400 audit(1554668436.955:55571): avc: denied { map } for pid=29532 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:37 executing program 2: prctl$PR_GET_THP_DISABLE(0x2a) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000000000)=ANY=[@ANYBLOB="20000000010201000000d0498fb2940c84db02000c00020008000100e0000002"], 0x20}}, 0x0) pause() r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) set_thread_area(&(0x7f0000000040)={0x2, 0x0, 0x400, 0x400, 0xffffffff00000001, 0x800, 0xca7, 0x2, 0x0, 0x2}) [ 1311.282985] audit: type=1400 audit(1554668436.965:55572): avc: denied { map } for pid=29532 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1311.405797] audit: type=1400 audit(1554668436.985:55573): avc: denied { map } for pid=29532 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="56dc1f123c12563188b070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) recvmsg(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) ioctl(r1, 0x800, &(0x7f0000000100)="509b6864266004b5fd67b3dbe165fb10f5e970755f0d44fe5edff5d4b642573da9181cd130cf722c48b990cd44175371ad11fb43afea58c80f1d0ba2ed61a1489f28922a7d07e45afc9d307c4863e79fb13a4878a71bb7fdce5095eb9c2a041c68cf1be55c020fd5b61dd3deb1a987e0bad93b917f9ea70114b36565fa9312bc6a982f5cdd85b3f4d22376d295531e7ad5c775fdba2294a14ee347abe02b8e66a25d54ccb9c73095612579b7e2") setsockopt$inet_mreqn(r1, 0x0, 0x100000000000026, &(0x7f0000000380)={@multicast2, @local}, 0xc) [ 1311.511740] audit: type=1400 audit(1554668437.005:55574): avc: denied { map } for pid=29532 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:37 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup(r0) accept$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x0) r2 = gettid() r3 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) clone(0x3000000a0160100, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) wait4(r2, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000100)) [ 1311.669564] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 20:20:38 executing program 2: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) inotify_init() r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x808) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="65f336224bf63f972bab1dfbc2932db12f9832847a45fb92"], 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bcsh0\x00', 0x0}) sendmsg$nl_xfrm(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000640)=@getsa={0x124, 0x12, 0x529, 0x0, 0x0, {@in=@broadcast}, [@sa={0xe4, 0x6, {{@in6=@remote, @in=@remote, 0x4e22, 0x2, 0x4e23, 0xffff, 0xa, 0xa0, 0x20, 0x3f, r1}, {@in6=@rand_addr="b8ae4cff00f5cc8ad10aa2b72634a7dd", 0x4d3, 0x7f}, @in6=@loopback, {0x1, 0x8, 0x4, 0x81, 0x2, 0x8, 0x8, 0xd7}, {0x8, 0x1, 0x5, 0xfffffffffffffffe}, {0xbc, 0x400, 0xc000000000000000}, 0x70bd25, 0x3503, 0x2, 0x2, 0x6, 0x20}}, @replay_val={0x10, 0xa, {0x70bd2d, 0x70bd26, 0x9}}, @ipv6_hthresh={0x8, 0x4, {0x0, 0x23}}]}, 0x124}, 0x1, 0x0, 0x0, 0x800}, 0x8000) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@ipv4={[], [], @empty}, 0x68, r1}) [ 1311.799137] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 20:20:39 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='ip6tnl0\x00'}, 0x10) r1 = getpgrp(0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000000140)={0x2, r1}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000014000108000000000000000002000000", @ANYRES32=r2, @ANYBLOB="08000200ffffffff08000400e000000107d787774ce53d3f83c822b1246bc2c578ae5c4a9a65d5f255b86ab7e1ae1130f6ca8aaa93d613ce5758000000000000000000"], 0x28}}, 0x0) 20:20:39 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000000)) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@generic={0x3, 0x2, 0x6}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) 20:20:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) keyctl$session_to_parent(0x12) getpgid(0xffffffffffffffff) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r3 = socket(0x2, 0x3, 0x100000001) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xfffffffffffffe7a) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)={0x15, 0x65, 0xffff, 0x7, 0x8, '9P2000.u'}, 0x15) r4 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r4, 0x8007ffc) sendfile(r3, r4, 0x0, 0x400008bca) getsockopt$inet6_tcp_buf(r2, 0x6, 0x0, &(0x7f0000000280)=""/128, &(0x7f0000000000)=0x80) clock_gettime(0x0, 0x0) 20:20:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x80000001) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 20:20:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) statfs(0x0, &(0x7f0000000580)=""/46) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x9) r2 = gettid() request_key(&(0x7f0000000240)='x-\x00\x00\xc8\xa7\x00\x1a', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) wait4(r2, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140)={0x8, 0x1, 0x693, 0x1}, 0xc) r3 = dup2(r1, r0) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f00000005c0)=""/4096) mknodat(r3, &(0x7f0000000180)='./file0\x00', 0x1, 0x2cb8) 20:20:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000240)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000080)=0x8, 0x4) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000300)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x69, 0x7, 0x6, 0x2d1d, 0x912, 0x5, "0035d0025961ba113bffb30e704befa86eb62d78945a4ef55617066af271f9027bfc94b303a620cf2b6c23eba07d94df041110067f2ec7439023ab45efc1a8f966bd4d317bae6a2fd5a9da9b97853fb656eb0e64049ad146e16ca5937db9390992ae6589abc81dd75c"}, 0x181) 20:20:39 executing program 1: mkdir(&(0x7f0000000200)='./control\x00', 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x9c32f69e6caa24eb) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lstat(&(0x7f0000000100)='./control\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000240)=0xc) capset(&(0x7f0000000580)={0x20080522, r2}, &(0x7f00000005c0)={0x1, 0x89b, 0xfffffffffffffffe, 0x4, 0x0, 0xfffffffffffffffd}) chown(&(0x7f0000000080)='./control\x00', 0x0, r1) r3 = open(&(0x7f0000000000)='./control\x00', 0xc40beb2474dfd22a, 0xf6ffffff) r4 = fcntl$dupfd(r3, 0x0, r0) write$UHID_DESTROY(r4, &(0x7f0000000040), 0x4) 20:20:39 executing program 3: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) r2 = geteuid() fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000080)=@v3={0x3000000, [{0x9, 0x9}, {0x30, 0x8b8}], r2}, 0x18, 0x1) close(r0) io_setup(0x5, &(0x7f0000000040)) 20:20:40 executing program 5: syz_emit_ethernet(0xc0, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev={0xac, 0x70}, {[@timestamp={0x32000, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) syz_emit_ethernet(0x10c, &(0x7f0000000000)={@random="6600e1364d86", @random="66d1f3540934", [], {@ipx={0x8137, {0xffff, 0xfe, 0x0, 0x14, {@current, @broadcast, 0x7fffffff}, {@random=0x100000001, @broadcast, 0x8}, "d291a1587a9b9d43d95ee8f627db83d996a23e61b5f192fdd852422e356cb935ec133d1dd08d8515d01bce3384f50b0f32ea18a4f36516497645bbf3ea4307dc7f04bf6116243a2c2599e8ceabb799822cee81d02e169f95e70b3b9709c09b0890dfbd99f97429794d071bd33103a7ec4f22e6c687bff52d1d962a7b97963e8bc7e2dcb290d7619b94d4c62e787e5a935295e711d979dd3d185fd09a69ef32021ced8b1cd7799f6085d7ce6af36ac5c5a4c1516b854ef905a958e4ed74208d8b90f49945f9370f1f2fe6549520fb218d7bf19b25d40eced2f551a812a4555967"}}}}, &(0x7f0000000140)={0x0, 0x3, [0x314, 0x497, 0xb5, 0x3be]}) 20:20:40 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) fcntl$setown(r1, 0x8, r2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x1) r4 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0x7}, 0xff7f) getsockname(r3, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r4}) 20:20:40 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) futex(0x0, 0x0, 0x4, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], 0x2b8) futex(&(0x7f000000cffc), 0xc, 0x0, 0x0, 0x0, 0x0) r1 = add_key$user(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="a81ec7e7a7f04d7ecf37961267075f48c56bc65f36e828984d94f54f8f52dd1c9ce2b3996c24ff1d286c956983fc51b2723ec8a30c3f1d3914f5e6f9c2676a1e990c30c07b749b6f2fd54d63cd18b770957b2bee03ae73c41de1e473946091388c7c0f4e04e41349fb7f1e92e0652f98bd8201ef93a6fb02f92373e1b502c6274e0d164b251634ea3b5db18e79eedddd900d4991cfb2f4107f0066", 0x9b, 0xfffffffffffffffb) keyctl$read(0xb, r1, 0x0, 0x0) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x10000, 0x4, 0xbf, 0xb796, 0x0, 0x1f, 0x5, 0x3, 0x100000000, 0x0, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x101, 0x4, 0x2, 0x3, 0x5, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x1, 0xda3, 0x80000000, 0x5, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x9) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x2, 0x0, 0x0, 0x9917, 0xffff}, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000740)={0x0, 0x0}) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x82) prlimit64(r4, 0x6, 0x0, &(0x7f0000000080)) r6 = creat(&(0x7f0000000380)='./file0\x00', 0x120) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) r7 = eventfd2(0x5, 0x80801) write$binfmt_elf64(r7, 0x0, 0xffffffffffffff2a) fallocate(r2, 0x0, 0x100000001, 0x0) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f0000000700)) add_key(&(0x7f0000000400)='id_resolver\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)="86a712dda709e9c3466498e8e042b5312161ff6260d06d7017d7ae73fc54a970e745eace9d88e7fdaa8a1c10ce45252f443c2dd304ac4b1723e7d84ca02c457a122b2b55668fd660f46dabf800002db0401172ea9b2d85429c21ad0adde2f084f4a972d46afe1ca0fda8027ea94be1488299901739a0b85d200d3f8b6a29b5fd2fd24d1c734c5bcf1137114e46a80732a8149176b73d521de556d10df33d56a8be372d5112230158b54c97620948287015a64bc8377f0ef8a535407caa3b57135a7678201a3f9dadffe2a7fcfde9b9377d9184ccb8e5b7ad906b48da6a1b194656ff5bc2bfa55b4cadcf41b97bcdcf6d", 0xf0, 0xfffffffffffffff9) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000a00)={'syz', 0x1}, 0x0, 0x0, r1) getsockname$packet(r5, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) write$binfmt_elf64(r6, &(0x7f0000000a40)={{0x7f, 0x45, 0x4c, 0x46, 0x7ff, 0x1ff, 0x401, 0x1, 0x1, 0x3, 0x6, 0x200, 0x3c3, 0x40, 0x1e7, 0x7, 0xfffffffffffffffb, 0x38, 0x1, 0x2, 0xfffffffffffffff7, 0x4}, [{0x7, 0xffffffff, 0x4, 0x91, 0x2, 0x57, 0x10001, 0xffffffffffff0001}], "53548ec125e496204ee431965a83980712c6bfb258e19d980d9d33741091c77feeb128e8ec8949129378e49e317c6170c5e58e1eb23473892b220b781b3f77c586ef5acb5ce5daae565ffa747f002caae365873e1e3c5a2d9f0dd75a2d82a8d6f14dbb643e8607171d688b6dfe58a51a90c0994d857c70fe8697b045ba94c13458683a9e3be45469d61b8d64b5d0ac80a3d4e478de4179e03a27291f0fe08992965553d925a7abfebd4b96de2148711515e7a6155c62b610275ca3e4733c9db72b5857c15a712d12d5a56490d1702b020b08c76b1611fd6f3d58da8496da", [[], [], [], [], [], []]}, 0x756) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f00000006c0)={0x1, 0x61, 0x9, 0xffffffffffff0025}) r8 = open(&(0x7f0000000240)='./file0/file0\x00', 0x40c00, 0x1) fallocate(r6, 0x2e, 0x6, 0xfff) unshare(0x40000000) setsockopt$inet_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) getcwd(&(0x7f00000001c0)=""/103, 0x67) 20:20:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_read_part_table(0x0, 0x0, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e, 0x80000) sendmsg$unix(r1, &(0x7f0000000400)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000280)="5a6ba129330e4481d4dbef52932453bef94be1ad376bef4cbf35b6b71aa413b08d1fc8bb7785cb7085b3d36ff4f43063a1622b098a991a8dc7b2aa0950ad0fd2cdbdbafa30ab7d9a7f0f611c0f09db73d862753dcc3394cb552e1e32220f8d2dea049047699321c9a1e935bb595b9ea620b89905f59ba239155236ec6d030b8b7bb07279680c5d", 0x87}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000028b900000000cb1b0000000000000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0x70, 0x801}, 0x800) syz_read_part_table(0x20, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="12866d0e90fc6a42ece5992db095f034de2d115a9317f8d3f20a3a4758ead764b9c3bda5cc83c1ca2c227c9413e8ac98983665e9c9e29c86c0ed23100489994620a48bf56277ad3de9489d816fd0e29127a7664ad59a371b5e58640ace840ae812146603831e44097a199f9be90b0543ea576ed16405d00f419196a15b24c7946ba892292ef33e0b89a3af690b3d96629272f3730df6225b7ebc9f14e7d8b265a835479b4065425433b4afbf968af807ef356e3266c000e01feafd1b927457fb5751a83e06ace6be653e06df07b88b2ff15cbdbebe4d923395a5d955aa010469", 0xe0, 0x3}]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) flock(r0, 0x0) prctl$PR_SET_FPEMU(0xa, 0x3) prctl$PR_SET_SECUREBITS(0x1c, 0x24) 20:20:40 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x0, 0x1, 0x6, 0x3, 0x7fffffff}}) io_setup(0xfffffffffffffff8, &(0x7f0000000100)=0x0) io_getevents(r1, 0x6, 0x1, &(0x7f0000000140)=[{}], &(0x7f0000000180)) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x3) io_setup(0x40000100000003, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 20:20:40 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x83) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x8) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 20:20:41 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xd56}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x8, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = getpid() r3 = getpgrp(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000840)={0xffffffffffffffff}) capget(&(0x7f00000001c0)={0x20080522, r3}, &(0x7f0000000200)={0x0, 0x0, 0xffffffff, 0x0, 0x3ff, 0x8001}) socket$inet6(0xa, 0x400000000001, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0xfffffffffffffffe) dup(r0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() clone(0x2040001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x4000000000000) r7 = perf_event_open(&(0x7f0000000040)={0x200000002, 0x70, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r5, 0x0) r8 = dup2(r7, r5) setsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x331}, 0x8) ptrace(0x10, r6) wait4(0x0, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0xe) r9 = request_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='!\'wlan0[\x00', 0x0) keyctl$set_timeout(0xf, r9, 0x33a) syncfs(r1) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) signalfd(r4, &(0x7f00000000c0)={0x7ff}, 0xffffffffffffffc7) io_setup(0x0, 0x0) io_setup(0x10001, &(0x7f0000000240)) io_setup(0x0, &(0x7f0000000280)) 20:20:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000001340)={@loopback, @remote}, &(0x7f0000001380)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)=0x0) capget(&(0x7f0000000240)={0x20080522, r1}, &(0x7f0000000280)={0x4, 0x0, 0x0, 0xffffffffffff31db, 0x9, 0x9}) clone(0x1000000000040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(r2, 0x0, 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x8) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f00000002c0)='pids.events\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000300)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x400, 0x0) write$P9_RLCREATE(r4, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x0, 0x4, 0x8}, 0x2}}, 0x18) 20:20:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x120}}, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x15, 0x7, 0x1, "7398fc6f0f79597df9244dbf2e3e3672"}, 0x15, 0x2) write$binfmt_aout(r0, &(0x7f00000002c0)={{0x1cf, 0xad2, 0x4, 0x33b, 0x1a7, 0x8, 0x322, 0x8}, "ba7c5311d145323f79bd806f8e3c168c647d4ae0d62e8aa924df5b0877f62c753a43703d09759d9c1771c4778a0fc3a1c0fe0356a94e31c93dd020", [[]]}, 0x15b) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0xf) 20:20:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = gettid() ptrace$getenv(0x4201, r2, 0x9, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000200), 0x4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x39) fcntl$setstatus(r1, 0x4, 0x200000001002000) 20:20:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6tnl0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={@empty, 0x0, r1}) seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x20}, {0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) 20:20:42 executing program 0: r0 = syz_open_pts(0xffffffffffffff9c, 0x201) flistxattr(r0, &(0x7f0000000340)=""/188, 0xbc) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x240, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040)=0x1ff, 0x4) r2 = getegid() ioctl$TUNSETGROUP(r1, 0x400454ce, r2) socket$inet6(0xa, 0x4, 0x5) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1c, &(0x7f0000000080)=""/167, &(0x7f0000000140)=0xa7) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='veno\x00', 0x5) r3 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={@local, @initdev, @ipv4={[], [], @local}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x40001}) 20:20:42 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) request_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz'}, 0x0, 0xffffffffffffffff) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x4100, 0x0) 20:20:42 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2000040000003b, 0x2}, 0x3c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000025c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x100, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x1) [ 1316.712734] kauditd_printk_skb: 269 callbacks suppressed [ 1316.712750] audit: type=1400 audit(1554668442.915:55844): avc: denied { map } for pid=29658 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0xfff) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000180)=""/137) creat(&(0x7f0000000280)='./file1\x00', 0x0) fcntl$setlease(r0, 0x400, 0x80000003) rename(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0x3f, 0xd4) 20:20:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) getpgid(r2) r3 = dup(0xffffffffffffffff) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000400) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') waitid(0x0, r2, &(0x7f0000000540), 0x1, &(0x7f0000000740)) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x20008000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f00000002c0)={0x7, 0x70, 0x2, 0x7fff, 0x4, 0x7, 0x0, 0xff, 0x1040, 0x0, 0x8, 0x7fffffff, 0x2, 0x7, 0x2, 0x0, 0x5, 0x0, 0x7, 0x2, 0x46, 0x75c, 0xe9de, 0x50, 0x8, 0xc740, 0x80, 0x100000001, 0x0, 0x0, 0x3, 0x80000001, 0x0, 0xfd, 0x3, 0x0, 0x80000001, 0x4, 0x0, 0x7ea, 0x6, @perf_config_ext={0x59bb, 0x6}, 0x12000, 0x5, 0x1, 0x0, 0x3, 0x0, 0x7}, r2, 0x0, r3, 0x3) ioctl$BLKROGET(r3, 0x125e, &(0x7f00000004c0)) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, 0x0, 0xfffffffffffffef0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x21fffc, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) setsockopt$inet6_tcp_int(r6, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x4) ioctl$IOC_PR_PREEMPT_ABORT(r7, 0x401870cc, &(0x7f0000000400)={0x6, 0x5e, 0xbf5e, 0x2}) bind$inet6(r6, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @rand_addr, 0x8000000000000000}, 0x1c) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000140)) [ 1316.882012] audit: type=1400 audit(1554668442.955:55845): avc: denied { map } for pid=29665 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1317.019336] audit: type=1400 audit(1554668442.965:55846): avc: denied { map } for pid=29665 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1317.134178] audit: type=1400 audit(1554668442.975:55847): avc: denied { map } for pid=29665 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1317.250467] audit: type=1400 audit(1554668442.975:55848): avc: denied { map } for pid=29658 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1317.420578] audit: type=1400 audit(1554668442.975:55849): avc: denied { map } for pid=29665 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:43 executing program 0: r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@rc, &(0x7f0000000100)=0x80) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8b01}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xcc, r1, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xb8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7fff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xfff, @mcast1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xfffffffffffffffb, @ipv4={[], [], @multicast1}, 0x8000}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x8000) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x14, 0x14, 0x301, 0x0, 0x0, {0x8000020000000002}}, 0x14}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth0_to_bridge\x00', 0x10) 20:20:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) futex(&(0x7f0000000100)=0x2, 0xb, 0x1, &(0x7f0000000140), &(0x7f00000001c0), 0x1) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x5010, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='ramfs\x00', 0xffffffffffffff9c}, 0x10) fcntl$setlease(r0, 0x400, 0x1) [ 1317.638567] audit: type=1400 audit(1554668442.995:55850): avc: denied { map } for pid=29665 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:43 executing program 2: socketpair$unix(0x1, 0x1000100000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec3, 0x0) fcntl$setpipe(r2, 0x407, 0x0) dup2(r1, r3) close(r2) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) socket$inet6(0xa, 0x3, 0x84) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000080)=@req3={0x8, 0xfab, 0x8, 0x80000000, 0x8, 0x9, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000140)={0x19980330}, &(0x7f000047efe8)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_int(r5, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000)=0xdf55542d16cbe09f, 0x4) sendto$inet(r5, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYPTR], 0x8) [ 1317.705196] audit: audit_backlog=67 > audit_backlog_limit=64 [ 1317.713916] audit: audit_backlog=67 > audit_backlog_limit=64 [ 1317.728685] audit: audit_backlog=67 > audit_backlog_limit=64 20:20:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000640)='./file0\x00', 0x10) connect$inet(r1, &(0x7f0000000380)={0x2, 0x4e22, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x24280014}, 0xc, &(0x7f00000005c0)={&(0x7f0000000440)={0x170, r2, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x47}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xaa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffe0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}]}, @TIPC_NLA_MEDIA={0x108, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9c1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4e6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}, @TIPC_NLA_BEARER={0x4}]}, 0x170}, 0x1, 0x0, 0x0, 0x10}, 0x4080) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x4, {0x2, 0x0, @broadcast}, '\x00\x00\x00\x00\x01\x00\x00\x00\xff\xff\xff\xff\xff\xff\xf1\x00'}) getsockname(r3, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000140)=0x80) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r5, 0x400, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x10, 0x3, @udp='udp:syz0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 20:20:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x220000, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) r2 = accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlinkat(r1, &(0x7f0000000300)='./file0\x00', 0x200) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r2}, 0x10) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f00000002c0)='./file0\x00') sysinfo(&(0x7f00000007c0)=""/154) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r3, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000001c0)={@local}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000380)={'team0\x00'}) getsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000002300)={@initdev, @dev}, &(0x7f0000002340)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000002380)={{{@in=@loopback, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000002480)=0xe8) ioctl$sock_ifreq(r4, 0x8921, &(0x7f0000002600)={'erspan0\x00', @ifru_addrs=@xdp={0x2c, 0x4, 0x0, 0x30}}) 20:20:45 executing program 4: r0 = socket$inet6(0xa, 0x10000000003, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in, 0x0, 0xff}, 0x0, @in6=@local}}, 0xe8) syz_emit_ethernet(0x4a, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60d8652b00140600fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50000000907800006ff69df82b640857459899f3f0a2f59101a29c4cd886637c338d37156906fec16625ad3bfb2a253bbad234534fe5bb457eaf171f75e4ecf46369ccf9c64671889d3851d0579fb0f11533528e5cdec22c1fb49907f5b1ef7c8572a6a29ebf7b7fe410a0a7764cd9c126da016e060c47a2cce28f0ed1298c9acac69172305727b2a171d70c91ff129f2b668f8dae5b452189ce7f84ac635de0edc18321cf3a9202"], 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000380)={0x3, {{0xa, 0x4e23, 0x80000001, @ipv4={[], [], @rand_addr=0x7fff}, 0xffffffff}}, 0x1, 0x5, [{{0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffffffffffffff00}}, {{0xa, 0x4e22, 0x5, @mcast2, 0x80}}, {{0xa, 0x4e21, 0x7a4b, @empty}}, {{0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}}, {{0xa, 0x80000000, 0x2, @mcast1, 0x8}}]}, 0x310) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:20:45 executing program 1: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000400)) dup3(0xffffffffffffffff, r0, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f00000000c0)={0x1000000000009}) 20:20:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x1, 0x40, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0xfffefffffffffffc}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x7fffffff}) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000180)={0x7f, @multicast2, 0x4e23, 0x3, 'lblc\x00', 0x1, 0x9, 0x6f}, 0x2c) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RAUTH(r2, &(0x7f0000000140)={0x14, 0x67, 0x1, {0x4, 0x1, 0x6}}, 0x14) 20:20:45 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x40) accept4$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x800) bind$packet(r0, &(0x7f0000000340)={0x11, 0x11, r1, 0x1, 0x3, 0x6, @remote}, 0x14) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r3 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000200)='cpu&5\n\n\n\x00\x00\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') 20:20:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00\x00\x00\x00\x00\x01\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000091400c47400000000000044258b0600000000000500eda7ed34e10523306757cc06c4d8f09c63d0dd676dfe746a9a254168f22c0bed8bf83cbd079a5b80adadfa9d7ec10d0769b67e5305779dfaa7dd0ec90cc07b757b56", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000000000000000aa"], 0x2c}}, 0x0) 20:20:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f00000001c0)=0x200) fcntl$dupfd(r0, 0x406, r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000280)=0x3, 0x4) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x101000, 0x0) dup2(r0, r0) pread64(r3, &(0x7f0000000240)=""/35, 0x23, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x7) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x35a3, 0x4) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='bond_slave_1\x00') getsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000b67000), &(0x7f0000000080)=0x4) syncfs(r0) 20:20:45 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x5) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff1f75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000000000000004) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$BLKIOMIN(r0, 0x1278, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000400)=0x1c0000000000000, 0x4) umount2(&(0x7f0000000000)='./file0\x00', 0x0) timer_delete(0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000340)=0xe8) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000100)=0x7, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x8, 0x9, 0x3b, 0xfffffffffffffff9, 0x7f}) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000140)={0xa33, {{0x2, 0x4e23, @broadcast}}}, 0x88) 20:20:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{&(0x7f0000000140)=@sco, 0x80, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/25, 0x19}, {&(0x7f0000000200)=""/48, 0x30}, {&(0x7f0000000240)=""/48, 0x30}, {&(0x7f0000000280)=""/174, 0xae}, {&(0x7f0000000340)=""/222, 0xde}, {&(0x7f0000000440)=""/163, 0xa3}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x7, &(0x7f0000001580)=""/106, 0x6a}}, {{&(0x7f0000001600)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001840)=[{&(0x7f0000001680)=""/204, 0xcc}, {&(0x7f0000001780)=""/179, 0xb3}], 0x2}, 0x6}, {{&(0x7f0000001880)=@xdp, 0x80, &(0x7f0000001940)=[{&(0x7f0000001900)=""/36, 0x24}], 0x1, &(0x7f0000001980)=""/235, 0xeb}, 0x1}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001a80)=""/196, 0xc4}, {&(0x7f0000001b80)=""/116, 0x74}, {&(0x7f0000001c00)=""/29, 0x1d}], 0x3, &(0x7f0000001c80)=""/3, 0x3}, 0x3}], 0x4, 0x102, &(0x7f0000001dc0)={0x0, 0x1c9c380}) accept4$inet(r0, &(0x7f0000001e00)={0x2, 0x0, @initdev}, &(0x7f0000001e40)=0x10, 0x80000) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001e80)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet_int(r4, 0x0, 0xf, &(0x7f00000000c0)=0xd38, 0x4) open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x40) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffd) 20:20:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') socket(0x1a, 0x3, 0x1000) lseek(r0, 0x40000004, 0x0) 20:20:46 executing program 4: getresuid(0x0, &(0x7f0000000840), &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000009c0)) getuid() getegid() lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x2) unlinkat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) 20:20:46 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x23) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0x3, &(0x7f0000000080)=0x0) io_getevents(r1, 0xfff, 0x7, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000100)) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/58, 0xffc1) timer_create(0x5, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) timer_getoverrun(r2) 20:20:46 executing program 2: pipe2(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r2 = syz_open_procfs(r1, 0x0) getpgrp(0x0) ioctl$TIOCLINUX6(r2, 0x541c, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 20:20:46 executing program 1: r0 = creat(&(0x7f0000000580)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)="0c5ba5d847e2952178d0cb125b35e6595492ccee2e3e0dd108b575eee9203e4cb215d2f521945ea4c445c1a7a7c9f23826fe2089397e5daa1ac814cd7ee732e02dfd1bd21f5d5010353dc67090db", 0x4e, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000005c0)="6a696f70d29c2369761329952a2a5aac077d056df74235b181d9474cfadc3a1ddb2732cf2192d061e840ce9cd6e6498820039addd3c898e1940ac03c1f1646fa05c7fb811d1927e55b4212bdd25da82816dce9b7a24cddaf8bdd8c5e7d8f3bb43580746a8c34eaa8a7c1ae6f2a8c6df45c1936c10e083fc18640990061f1e6af87db06cc97efd8759a9d990d1be55993c93e71fa18a0d0555abac6b75d1b5ddd7ba562f2359954fcc76063619030087e2688881627eec845ee5105edab7310c87efbb65416415753adfe1afa923fc83ad2b4b3e76e461f47d78ba4d519169dc0b97c61ad4fd8c748462dd7d3a16f94465b6d1b", 0xf3, 0xfffffffffffffff8) keyctl$negate(0xd, r1, 0x8, r2) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000080)='wlan1$\x00', &(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)='GPLuser,%\x00', &(0x7f0000000140)='mime_typemime_type/GPL\x00', &(0x7f0000000180)='keyring\x00'], &(0x7f0000000280)=[&(0x7f0000000240)='keyring\x00']) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x134) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) setresuid(r3, r3, 0x0) setregid(0x0, r4) 20:20:46 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x8, 0x3) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$getsig(0x4202, r0, 0x1f, &(0x7f0000000000)) wait4(0x0, 0x0, 0x0, 0x0) 20:20:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000000)={0xf2a, 0x2, 0x5, 0x4, 0x9, 0x20}) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x200000043, &(0x7f00000003c0)="8dc94ec1", 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x1, 0x5, 0x6, 0x0, 0xa, 0x101, 0x0, 0x80000000, 0x80000001, 0x1, 0x8, 0x7}) 20:20:47 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup(r0) r2 = accept$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e21, 0x2, @remote, 0x7}}, 0x0, 0x0, 0x0, "67aa71df289d4c0b8665ff1c35f6e4c5e0423b062420430899dd30cc3725e8b970cd57f4cf552efbdf43dd4f98801f3487e67c8205a0fafec8c0bf75c50ef57112d3689a8d248347a14da4964b46aa1c"}, 0xd8) r3 = gettid() r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) clone(0x3000000a0160100, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x11) wait4(r3, 0x0, 0x0, 0x0) accept$packet(r4, 0x0, &(0x7f0000000000)) set_tid_address(&(0x7f0000000100)) 20:20:47 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000080), 0x9, 0x2, 0x0, 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000440)={0x14, 0x49, 0x1}, 0x14) poll(0x0, 0x0, 0x84d8) setpriority(0x0, 0x0, 0x82) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000400)) r1 = socket$inet6(0xa, 0x2, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x25) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x3ffffeb, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f000000ac80), 0x66, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x8000, 0x0) fcntl$dupfd(r2, 0x0, r2) getresuid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) fstat(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000540)=[0x0, 0xffffffffffffffff]) lsetxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32=r0, @ANYBLOB="4ab46200000000000009cd1d5402000210", @ANYRES32=r0, @ANYBLOB="02000400", @ANYRES32=r0, @ANYBLOB="02000100", @ANYRES32=r3, @ANYBLOB="040005000000000008000000", @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="10000100000000002000010000000000"], 0x5c, 0x2) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$TIOCLINUX4(r7, 0x541c, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) unshare(0x0) munlockall() 20:20:47 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1b, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000140)=0xfffffffffffffffd, 0xffffff20) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x7}, {0x6}]}, 0x10) 20:20:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x100000000000019, &(0x7f0000548000)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = accept4(r0, &(0x7f00000000c0)=@un=@abs, &(0x7f0000000000)=0x80, 0x80800) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x25c, 0x0, 0x3b3}, 0x2000) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000140)="5e50da31fa58864fc7721d01f25214de4ab5993eab4c1dd593555031f990d7022cffe6df48026d27581bd9906acc0128830cfc327d3b5c58065d413bba198d8c76cb435660a41cab9da94509e81936337a6ac9838a69ba5d2bbe62cbc1c6f321323f80596a541e", 0x67) 20:20:48 executing program 2: r0 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) futex(0x0, 0x83, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1321.756269] kauditd_printk_skb: 277 callbacks suppressed [ 1321.756279] audit: type=1400 audit(1554668447.955:56092): avc: denied { map } for pid=29806 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1321.951085] audit: type=1400 audit(1554668448.045:56093): avc: denied { map } for pid=29806 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1322.087126] audit: type=1400 audit(1554668448.045:56094): avc: denied { map } for pid=29806 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:48 executing program 3: ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x10020, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ustat(0x8, &(0x7f00000002c0)) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="e959f5faea3b6d11b8440f8c7cebf995f51a63d3d33cce9f67201139abaa4a821410544b6e5dc66e829ed33933fd60da654fbf13c8b49dc33763bb8731750739b5a1327bf61d9a8256f6212cf750972377aeb1deb76818f2e5d3c75206fe0a45b8d59875e92414230217c31ff3bd95a7b773a71c5dd207d55d81e6dca9ea7f58dda0bc", 0x83, 0xfffffffffffffffe) mknodat(r1, &(0x7f0000000240)='./file0/file0\x00', 0x21, 0x5) keyctl$invalidate(0x15, r4) fallocate(r3, 0x0, 0x0, 0x4003ff) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4006, 0x0) sendfile(r5, r5, 0x0, 0x8800000) dup2(r0, r2) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000280)={0xa000000, 0xdb10}) [ 1322.230132] audit: type=1400 audit(1554668448.045:56095): avc: denied { map } for pid=29806 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1322.351533] audit: type=1400 audit(1554668448.105:56096): avc: denied { map } for pid=29806 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1322.521797] audit: type=1400 audit(1554668448.145:56097): avc: denied { map } for pid=29806 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1322.630417] audit: type=1400 audit(1554668448.155:56098): avc: denied { map } for pid=29806 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1322.750146] audit: type=1400 audit(1554668448.205:56099): avc: denied { map } for pid=29825 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:49 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="441f0804000000000000006491ee54be8e1c2074ed27c1c6fe76cef3e2", 0x1d) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f00000001c0)) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000000)=0x44) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x10100, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x2000, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x70, r2, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8000000000}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x8080}, 0x800) 20:20:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000100)) socket$unix(0x1, 0x1, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)=0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) tgkill(r2, r3, 0x1d) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x10) ioctl$VT_WAITACTIVE(r1, 0x5607) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 20:20:49 executing program 5: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f00000052c0)={0x2, 0x80004e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x2000000007) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='asymmetric\x00', &(0x7f0000005400)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x2, 0x40) exit(0x80000003) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0x229}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f0000005180)=ANY=[@ANYRES64=r0, @ANYRESDEC=r0, @ANYRES32=r3, @ANYRES16=r0, @ANYRES64], 0x5}, 0x1, 0x0, 0x0, 0x90}, 0x4000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) r5 = accept4$inet(r3, 0xffffffffffffffff, &(0x7f0000000100)=0xffffffffffffff81, 0x4) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpeername(r5, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000005840)) accept$packet(r3, &(0x7f0000004dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xfffffffffffffdad) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000005c40)={'team0\x00'}) accept$packet(r3, 0x0, &(0x7f0000005cc0)) sendmsg$TEAM_CMD_OPTIONS_SET(r2, 0x0, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:20:49 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = dup(r0) sendto$inet6(r1, &(0x7f00000000c0)="b68b6dcd9ba28daa4b1a4a759f09fac328633e9d1f8f78b59a35c89cbfe9533ef94b213449e20a6976ccd937d6d329933b0e1e662416968fe13cedb79265354bb9a03201608da9e12f4759bdce4c03e95e9cfe881521dd4da4d84ec40891c364a32431fd442c11b0dfdc2d4f9cdcd1ad0a0318129f8df75a102e61122a3e33407be42e4647db29f08f93ed15ebc3487e96af64fd2a0e0944eab3c7ceb9b3299f09ed7f6ad8c3f965612fa0dc8044f2f76ceed115e38900c0dcd5f36b91883febbb361e952143d58ed85f48866617cc22f2", 0xd1, 0x800, &(0x7f00000001c0)={0xa, 0x4e20, 0x4, @mcast2, 0x7}, 0x1c) prctl$PR_SET_FPEMU(0xa, 0x1) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x105802, 0x0) epoll_create1(0x80000) write$9p(r2, &(0x7f0000000800)="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", 0x600) sendfile(r2, r3, 0x0, 0x10000) [ 1322.890449] audit: type=1400 audit(1554668448.215:56100): avc: denied { map } for pid=29825 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1323.118608] audit: type=1400 audit(1554668448.225:56101): avc: denied { map } for pid=29829 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = creat(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x8, 0x12, 0xb5, 0x8, 0x0, 0x4, 0x10, 0x3, 0xc4, 0x0, 0x6, 0xda, 0x101, 0xe5, 0x2, 0x5, 0x81, 0xe8, 0xfffffffffffffff9, 0x2, 0x8000, 0x2, 0xc60, 0x10001, 0x7b8c, 0x2, 0x8, 0x3, 0xff, 0x6, 0xfffffffffffffe01, 0x4, 0x66a, 0x1, 0x401, 0xffffffff80000001, 0x0, 0x627, 0x3, @perf_bp={&(0x7f0000000200), 0x7}, 0x1080, 0x10000, 0x7, 0x0, 0x8, 0x8, 0x3}, 0x0, 0x5, r1, 0xa) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x10000000000080}]}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000380)=[@sack_perm, @mss={0x2, 0x3}, @mss={0x2, 0x1fb}, @sack_perm, @mss={0x2, 0x3}], 0x5) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) vmsplice(r3, &(0x7f0000001500)=[{&(0x7f00000003c0)="6e1254a9bb690d2edda5356f319565dacdc2edfdbc8a336be4590765646cda8ae3557a0464a55d09b5ebaa575a0809a2ef6e8112e909e3710effd7e55d2b67e3a3d970d713b4f4c5039baad0667b67697473d12a86ef61b5100d6abe2c57dcb71f5e04adf521a269b3806291bfa533840c94ed6c2823e7babd130fc46b7440ec4060e12b1be1392894dfb6a0989e63be1f867ca46541478989ab715d87f68dbc", 0xa0}], 0x2a4, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x53) r5 = gettid() perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x1, 0x0, 0x10000, 0x7, 0x0, 0x6, 0x800, 0xd, 0x7f, 0x2, 0x1f, 0x2, 0x9, 0x8, 0x9, 0x3, 0x4, 0x7, 0x0, 0x9, 0x1, 0x0, 0x80000001, 0x1f, 0x80000000, 0x0, 0x3, 0x7, 0x100000000, 0x101, 0x0, 0x10001, 0x5, 0x5, 0x100000000000000, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x10000, 0x5}, 0x10, 0x8001, 0x1f88000000000, 0x8, 0xff, 0x15b7, 0x7}, r5, 0x5, r3, 0x8) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 20:20:50 executing program 0: exit(0xfffffffffffffffd) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x51, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000480)='./file0\x00') mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_smack_transmute(&(0x7f0000000380)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x1) getpeername$unix(r0, &(0x7f0000000540)=@abs, &(0x7f0000000400)=0x6e) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000003c0)=0xc) sched_setattr(r1, &(0x7f00000004c0)={0x30, 0x3, 0x1, 0x1, 0x26, 0x1, 0x9, 0x1}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') sendfile(r2, r3, 0x0, 0x800000bf) ioctl$sock_proto_private(r3, 0x89eb, &(0x7f00000005c0)="dd9c3381a950e8f36736e23da084e9de17307e8cc30fd0ad5ff4d92b0f4709d0f198eaf024846575c811e6cbfdfe6975f33752ec224a5e778e6db81d759822e742c0058fd338651c3a0c0c88cf44001545c73408fe9d226d7d640ca54a1b3cf29185109b0f1292c6db0055c603bb88d7cce0a8b950d92bfcee93be37656b2b0e4d4e3198414e78d6d2ceae2c321efd93ab117238329d3f700db60e7118eb09706a5a0b13e7583d8b42dd2f02ca1675b206e4f2177abf3c219157f9e1ecd14e330c1ca5b6b5e61110ca649cc890da063e6c") symlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000440)='./file0\x00') r4 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000000)="b6dec16c542ab7f63f62a752f7e76b9ac320fba5f6361de02adf38d0ebec916fcdca45e227bb04bdf61417d852765802cab9e8433ad7f04119b2d55599d3af914572604b397407cf66e45a793f0f26726d2d52df43ac09a5f04cab961c", 0x5d, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) exit_group(0x601d) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1400, 0xfff, 0x0) 20:20:50 executing program 3: add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$unlink(0x9, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000001c0), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x25000000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bind$inet6(r2, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) ppoll(&(0x7f0000000440)=[{}, {r3}], 0x2, 0x0, &(0x7f00000005c0), 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r2, 0x0, 0x1, 0x400, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) keyctl$search(0xa, 0x0, &(0x7f0000000380)='logon\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000300)={0x18, 0x73, 0x1, {{0x0, 0x0, 0x4}}}, 0x18) 20:20:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0xc5b1, 0x3, 0xb6, 0x8}) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:20:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup3(r0, r0, 0x80000) write$apparmor_exec(r1, &(0x7f0000000000)={'exec ', 'keyringcpusetselinuxem1\x00'}, 0x1d) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1598) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ff0000/0x3000)=nil) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 20:20:50 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000100)=""/203) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000080)=""/93) 20:20:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x3e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaacd250008004900e12f0000000000009078ac141400ac1423bb070b047f00000100000000000000000000211818b7e762b0b5f1b89d591b59970bf96e70d75f3926e4bbe42da0f6bda6e0a23e50987e548c9de9bf8ee4379cfde41a3bc72739a32f5d72be098b900e6a83aaf77dfda5f7969765671e76f01b33594c46c8b60ef19e97a10b1437c46d63b207b682b65ada154e6c412275c6a909bf9801f51e2167b243999b2c47a5ab97cc86056e090000006d2badbab3d7b517be5da6b2dc7cb1f0ab2238b099fe5327f5239747beb42110bf56ea00d511126119be2d9b6ef011234dade42ece04c267c8905c726dc9d859c8da36495525e1e4e0eec7465c9450ee8216df666cddaa8a03c94ed6eade11bef0f32d3c72513d65e74d3d63d41c469068b84d677c4d1f025d8c8549ebf5763af0e9d39cb960892ffb9bf249f760e05f58a4c3698dff0add6f28b1c942"], &(0x7f0000000100)) write$selinux_access(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a7373685f657865635f743a7330202f7573722f7362696e2f6e53d1ce8ad17470642030303030313030303030303030303030"], 0x44) 20:20:51 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x4) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 20:20:51 executing program 2: setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x101000, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000140)={0x0, r1, 0x0, 0x0, 0x20000032, 0x3b5}) fcntl$setstatus(r2, 0x4, 0x44000) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0xa5) io_setup(0x4ed4, &(0x7f0000000100)=0x0) syz_genetlink_get_family_id$tipc(0x0) ftruncate(0xffffffffffffffff, 0xbb1) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000000)=0x9) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x82, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000640)={0xc6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) r5 = syz_open_pts(0xffffffffffffffff, 0x400080) fsetxattr$security_smack_transmute(r2, &(0x7f0000000380)='security.SMACK64TRANSMUTE\x00', &(0x7f00000003c0)='TRUE', 0x4, 0x1) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000040)) 20:20:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000002040)=@generic, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') clock_gettime(0x0, &(0x7f00000019c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001740)=[{{&(0x7f0000000000)=@tipc=@id, 0x80, &(0x7f0000001540)=[{&(0x7f0000000100)=""/79, 0x4f}, {&(0x7f0000000180)=""/97, 0x61}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f0000000200)=""/115, 0x73}, {&(0x7f0000000280)=""/201, 0xc9}, {&(0x7f0000000380)=""/163, 0xa3}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/254, 0xfe}], 0x8, &(0x7f00000015c0)=""/85, 0x55}, 0x7}, {{&(0x7f0000001640)=@isdn, 0x80, &(0x7f0000001700)=[{&(0x7f00000016c0)=""/19, 0x13}], 0x1}, 0x2}], 0x2, 0x40, &(0x7f0000001800)={r1, r2+10000000}) pwritev(r0, &(0x7f0000000180), 0x3c7, 0x0) r3 = add_key$keyring(&(0x7f0000001840)='keyring\x00', &(0x7f0000001880)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_security(0x11, r3, &(0x7f00000018c0)=""/199, 0xc7) 20:20:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f0000000200)}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x892, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) shutdown(r1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000014c0), 0x3db, 0x0) 20:20:52 executing program 3: gettid() syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r3, &(0x7f00000017c0), 0x1a1, 0x0) 20:20:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0x40) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'yam0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000080)="ede8af", 0x3, 0x4000000, &(0x7f00000001c0)={0x11, 0x16, r1, 0x1, 0x5, 0x6, @remote}, 0x14) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:setrans_initrc_exec_t:s0\x00', 0x2b, 0x0) getdents64(r2, &(0x7f0000000200)=""/186, 0xa1) 20:20:52 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0xfffffffffffffffd) ioctl$BLKFLSBUF(r0, 0x1261, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x105080, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x98, r2, 0x110, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7506}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa0000000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x8040}, 0x800) 20:20:52 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="4514e45118660180c200000086dd60b420000030040080000000000000000000ffffe0000002ff020000000000000000000000000001810090780009040060b680e50000000000000000000000ffffffffffff000014ffbb0000000000000000000000b52fbb46c7d194109d1bfe84e8893123284dca9c467d39009ce56abecbde4f8c0edd26c0dd92990163afe05625b68e0ed89dfa5e4c000042ba048078ecf08b94f9ac2fe640a29420fea81d7f48d1bcd936483820794a846d796a"], 0x0) 20:20:52 executing program 2: clone(0x800000409ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000080)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x13) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="fa79be9c799330d1905433cdb5fccb0c8f57f28bed935c8b732b33ede813bdeda7a27775c5418889206e11265c9deea56e819137e3bd4f414e"], 0x39) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000140)={0x7, 0x4b, 0x2}, 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x101000, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000040), 0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1326.860121] kauditd_printk_skb: 283 callbacks suppressed [ 1326.860131] audit: type=1400 audit(1554668453.055:56385): avc: denied { create } for pid=29924 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:20:53 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x3c0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) memfd_create(0x0, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r0, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ip6_vti0\x00', 0xffffffffffffffb8) 20:20:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f00000000c0)=0xfffffe4a) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80002, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x541) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) [ 1326.984452] audit: type=1400 audit(1554668453.095:56386): avc: denied { write } for pid=29924 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:20:53 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000000)={0x1, 0x4, [@remote, @dev={[], 0x17}, @local, @link_local]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") ioctl$UI_DEV_SETUP(r0, 0x4008556c, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) [ 1327.084820] audit: type=1400 audit(1554668453.165:56387): avc: denied { map } for pid=29932 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1327.191055] audit: type=1400 audit(1554668453.165:56388): avc: denied { map } for pid=29932 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1327.282734] audit: type=1400 audit(1554668453.175:56389): avc: denied { map } for pid=29932 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1327.384183] audit: type=1400 audit(1554668453.175:56390): avc: denied { map } for pid=29932 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:53 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000200)='\xc7=\x83*m\xbd\xbc\x92.\x1a\v\xfcg\xb7\x9d\xcd\xf6\xebC\xba\xc5|HM\xa5\x87\x02\x87~\x84\xfe\x90\xc1\xbbPF\x05k\a\x8c\xd5\xe2\x87\xd8\x10>\x90\xcdqP\xd9\x9b\x1d\x1c\x9e1\xfcz;NY\xb6Q\x9c\xdd0\x99U\x1b\x9a}\x94\xd2\x96e\xfb\x06\x9a\x04\xc9 o\xa9Ce\xaa\xfa-\xa5 3\xc79Lj\xc5r\xda\xeaj\x9e\xa7\"\x99\xb6\xd5\x0e\xa9\xccsT\x99Sc\x05_I\xe7\xf8/d\xf6\xbe\xe4\x82\xf06O\xb8\xc5r\v\xa6h\xd1Z\x00\xbe\xfd\x18\x01\x03O\xc9\x81\x8f\xa1\x179\x06\xa3\xdce\x9e>\x06\x06@\xf9', 0x1) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x4000, 0x0) flock(0xffffffffffffffff, 0x88) exit(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x51, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, 0x0, 0x66) listen(0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000480)='net/unix\x00\xf1\xc9\xa0\xb3\x1e\x84\xa5v\xbd\xb3(\x92\x14\xe7>u\xedw\xf5\xe3\xfc\xc0\x8e\xa2\xe2=ue\xbf2}\xc6\xc3f\x8av\r\xcb\x84\xf2Z2\x93\xbd\xc177\x12b\xa0\x98bJ>r\xd4\x8ah\xc6\x84f\xfd\xdaIbV6x\x84\x93\xde^\xa3\'\xe0\xd1\xff\x06-i\x17\x01\xc9eSL7\x93\xe8\x9bb\xe3\xa5MA\xb7\x18rk#1\xf1\xb7q\xf9\xaf\x10uH') sendfile(r0, r2, 0x0, 0x800000bf) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:20:53 executing program 4: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x0) write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18}, 0xff9c) ftruncate(r2, 0x34f17e14) fcntl$setstatus(r0, 0x4, 0x4bff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x2, 0x70, 0x1, 0x0, 0x3, 0x40, 0x0, 0x7, 0x0, 0x2, 0x4, 0x3, 0x2, 0xffff, 0x62, 0x401, 0x7, 0x6, 0x40, 0x56c, 0x9, 0x3, 0x3ff, 0x1000, 0x3, 0x87d7, 0x0, 0x2, 0x5, 0x3, 0x8, 0x0, 0xd405, 0xc11d, 0x7, 0x3, 0x3, 0x19, 0x0, 0xfc, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x4000, 0x1000, 0x408000, 0x5, 0x20, 0x3, 0x7}) io_setup(0x200, &(0x7f0000000240)=0x0) write$P9_RSYMLINK(r2, &(0x7f0000000080)={0x14}, 0x14) io_submit(r3, 0x1, &(0x7f0000000340)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200), 0xfffffd07}]) creat(&(0x7f00000001c0)='./file1\x00', 0x128) r4 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGSKNS(r4, 0x894c, 0x0) ioctl$sock_SIOCGSKNS(r4, 0x894c, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000100)={0xc, 0x90, "498ddaf4b76f4e0af6052a53e0f85a34f6c84b91f961b1a731987a5af40ff7a00af8eeb33088e5f840a20b3a919cc541874066644fd5216d399a7c9b622a68e79dd3421787f5fd3af6211dc9eea96da874a5120504aa10d99b004a49b12f4d13dea9ccaeb88b3bf014c377089cdf7b72b4a6578c74a5bfd96f122db506f3b02c785abac5ee413bc1c9123ff6bb9adabc"}, 0x96) [ 1327.512469] audit: type=1400 audit(1554668453.185:56391): avc: denied { map } for pid=29932 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1327.614103] audit: type=1400 audit(1554668453.195:56392): avc: denied { map } for pid=29932 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) write$P9_RLOCK(r1, &(0x7f0000000040)={0x8, 0x35, 0x1, 0x3}, 0x8) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0xa79a}, @timestamp, @mss={0x2, 0x80}], 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x19, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2c) fcntl$setstatus(r1, 0x4, 0x42803) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000000c0)) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r2) [ 1327.717279] audit: type=1400 audit(1554668453.195:56393): avc: denied { map } for pid=29932 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1327.787753] audit: type=1400 audit(1554668453.195:56394): avc: denied { map } for pid=29932 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$loop(0x0, 0x0, 0x105082) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) r3 = getpgid(r2) getpgid(0x0) r4 = socket(0x2, 0x3, 0x100000001) bind$inet(r4, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) r5 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)=0xe5) ftruncate(r1, 0x8) prctl$PR_SET_PTRACER(0x59616d61, r3) sendfile(r4, r5, 0x0, 0x400008bca) clock_gettime(0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) 20:20:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000023c0), 0x10000000000000d6) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) 20:20:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r0, 0x40049409, r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x50000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x108, r4, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x56}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_NET={0x4}]}, 0x108}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f00000000c0), &(0x7f00000041c0)=0x4) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80000000) 20:20:54 executing program 1: syslog(0x4, &(0x7f0000000080), 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000140)=ANY=[@ANYBLOB="0180c20000000180c200000086dd6082ba8300443200fe800000000000000000000000000000ff0200000000000000000000000000010420880b0000000000000800000086dd080088be00000000100000000100000020f7ffff0100000000000000000000000800655800000000cff6e0dc76f99f87abcffac1b002653b21cf4b867abf00"/149], 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x4, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=""/185, 0xb9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r1, 0x4) 20:20:54 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0xfffffffffffffffe, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x1910824, 0x0) [ 1328.393279] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29981 comm=syz-executor.3 [ 1328.606335] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29979 comm=syz-executor.3 20:20:56 executing program 2: r0 = socket$packet(0x11, 0x400000000a, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000700)) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf={0xf, &(0x7f0000000000)="c8daef3b811b201a48213fce07a41d"}) 20:20:56 executing program 4: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f00000001c0)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000200)="1f0000000104fffff13b54c007110009f30501000b00024000000000600000", 0x1f) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000000)={0x3, {{0x2, 0x4e22, @remote}}, {{0x2, 0x4e24, @multicast1}}}, 0x108) 20:20:56 executing program 0: open(0x0, 0x20002, 0x2000000) pselect6(0xe, 0x0, &(0x7f00000000c0)={0x1}, 0x0, 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xffffffea) r4 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x24220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x12, 0x3, 0x6, &(0x7f0000000200)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) fsetxattr$trusted_overlay_nlink(r4, 0x0, &(0x7f0000000100)={'U-', 0x4}, 0x28, 0x1) r6 = fcntl$getown(r4, 0x9) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000240)=r1) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000001c0)) getpriority(0x0, r6) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000000)) 20:20:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x20800000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000240)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x6) 20:20:56 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x3fb) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3, 0x12, r1, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) recvfrom(r0, &(0x7f0000000040)=""/135, 0x87, 0x40010000, 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 20:20:56 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0xff, &(0x7f00000000c0)=""/50, &(0x7f0000000100)=0x32) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000002000/0x4000)=nil) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = accept(r2, &(0x7f0000000240)=@rc, &(0x7f00000002c0)=0x80) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x100000000, @rand_addr="52534abc5f69a820d3d1006e8fc72d9f", 0x7fffffff}}, 0x0, 0x6, 0x0, "63ee201261c4347a9d72f5dd7210d57fb20389812192427221665b6fae810a4a14d198dd442fcbebf6365fe56cf806a0593199bdbfff90f405faa822d0257b2b1bdecb8a36d6a618d578772c5e440b37"}, 0xd8) ioctl$FICLONE(r2, 0x40049409, r2) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e20, 0x40, @ipv4={[], [], @local}, 0x401}, {0xa, 0x4e23, 0x1ff, @mcast2, 0x4}, 0xfffffffffffffffd, [0xffffffffffffffe1, 0x0, 0x0, 0xf2b, 0x6, 0x5ad, 0xab6f, 0x3b]}, 0x5c) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)='erspan0\x00') 20:20:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x20002) ioctl$BLKDISCARD(r0, 0x127d, &(0x7f0000000080)) [ 1329.959921] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 20:20:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) [ 1330.047350] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 20:20:56 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x2, 0x0) setsockopt(r1, 0x107, 0x1, &(0x7f0000000080)="010000000000060000071a80000001cc", 0x10) close(r0) 20:20:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'bridge_slave_1\x00', 0x1131}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'lo\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000240)={@local, @remote, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000380)={0x0, @empty, @remote}, &(0x7f00000003c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000440)={0x0, @remote}, &(0x7f0000000480)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000cc0)={&(0x7f0000000100), 0xc, &(0x7f0000000c80)={&(0x7f0000000880)={0x3c4, r2, 0x800, 0x70bd28, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0xb8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x178, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r5}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x0, 0x4, 0x25, 0x12}, {0x40, 0x9, 0x401, 0x100000001}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8000}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffff5fb}}, {0x8}}}]}}, {{0x8, 0x1, r7}, {0x168, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffe00}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xa4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfae}}}]}}]}, 0x3c4}, 0x1, 0x0, 0x0, 0x11}, 0x10) 20:20:56 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) unshare(0x200) read(r0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./bus\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="88010000", @ANYRES16=r3, @ANYBLOB="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"], 0x188}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 20:20:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000), 0x4) 20:20:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0xcc) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000100), 0x4) 20:20:56 executing program 4: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x10) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) pivot_root(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) write$selinux_create(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a61725f63616368655f743a73d876b1a1a78730202f"], 0x27) chmod(&(0x7f0000000100)='./bus\x00', 0x1ba) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0xfffffffffffffffd) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r3, 0x0, 0x9219) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000), 0x1c) r5 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r5, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r5, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) getpgrp(0xffffffffffffffff) sendmmsg(r4, &(0x7f00000092c0), 0x4000000000001b9, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24, @rand_addr=0x3}, {}, 0x40, {0x2, 0x0, @remote}, 'ip6_vti0\x00'}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 20:20:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, [], [{0x7, 0xb8, 0x1ab4, 0x3, 0x7fff, 0x200}, {0x1, 0x80, 0x8, 0x2, 0x1, 0x9}], [[]]}) r2 = perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) r3 = socket(0x8, 0x1, 0x7f) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000180)={0x3b, @multicast1, 0x4e24, 0x3, 'wlc\x00', 0x32, 0xd, 0x4b}, 0x2c) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000280)={0x1, 0x10000}, 0x8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r4, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000001c0)=0x3) [ 1331.091825] [ 1331.093501] ====================================================== [ 1331.099818] WARNING: possible circular locking dependency detected [ 1331.106142] 4.14.111+ #50 Not tainted [ 1331.109932] ------------------------------------------------------ [ 1331.116239] syz-executor.5/30043 is trying to acquire lock: [ 1331.121938] (&event->child_mutex){+.+.}, at: [<0000000089f1d039>] perf_event_for_each_child+0x82/0x150 [ 1331.131484] [ 1331.131484] but task is already holding lock: [ 1331.137444] (&cpuctx_mutex){+.+.}, at: [<00000000485a6607>] perf_event_ctx_lock_nested+0x14d/0x2c0 [ 1331.146642] [ 1331.146642] which lock already depends on the new lock. [ 1331.146642] [ 1331.154952] [ 1331.154952] the existing dependency chain (in reverse order) is: [ 1331.162598] [ 1331.162598] -> #8 (&cpuctx_mutex){+.+.}: [ 1331.168139] [ 1331.168139] -> #7 (pmus_lock){+.+.}: [ 1331.173337] [ 1331.173337] -> #6 (cpu_hotplug_lock.rw_sem){++++}: [ 1331.179756] [ 1331.179756] -> #5 (&sb->s_type->i_mutex_key#10){+.+.}: [ 1331.186516] [ 1331.186516] -> #4 (ashmem_mutex){+.+.}: [ 1331.191969] [ 1331.191969] -> #3 (&mm->mmap_sem){++++}: [ 1331.197511] [ 1331.197511] -> #2 (&sb->s_type->i_mutex_key#5){++++}: [ 1331.204187] [ 1331.204187] -> #1 (event_mutex){+.+.}: [ 1331.209547] [ 1331.209547] -> #0 (&event->child_mutex){+.+.}: [ 1331.215653] [ 1331.215653] other info that might help us debug this: [ 1331.215653] [ 1331.223788] Chain exists of: [ 1331.223788] &event->child_mutex --> pmus_lock --> &cpuctx_mutex [ 1331.223788] [ 1331.234377] Possible unsafe locking scenario: [ 1331.234377] [ 1331.240426] CPU0 CPU1 [ 1331.245081] ---- ---- [ 1331.249745] lock(&cpuctx_mutex); [ 1331.253273] lock(pmus_lock); [ 1331.258977] lock(&cpuctx_mutex); [ 1331.265030] lock(&event->child_mutex); [ 1331.269099] [ 1331.269099] *** DEADLOCK *** [ 1331.269099] [ 1331.275157] 1 lock held by syz-executor.5/30043: [ 1331.279927] #0: (&cpuctx_mutex){+.+.}, at: [<00000000485a6607>] perf_event_ctx_lock_nested+0x14d/0x2c0 [ 1331.289559] [ 1331.289559] stack backtrace: [ 1331.294053] CPU: 0 PID: 30043 Comm: syz-executor.5 Not tainted 4.14.111+ #50 [ 1331.301227] Call Trace: [ 1331.303813] dump_stack+0xb9/0x10e [ 1331.307360] print_circular_bug.isra.0.cold+0x2dc/0x425 [ 1331.312727] ? __lock_acquire+0x2d83/0x3fa0 [ 1331.317044] ? trace_hardirqs_on_caller+0x37b/0x540 [ 1331.322062] ? trace_hardirqs_on+0x10/0x10 [ 1331.326333] ? check_preemption_disabled+0x35/0x1f0 [ 1331.331367] ? ___preempt_schedule+0x16/0x18 [ 1331.335780] ? lock_acquire+0x10f/0x380 [ 1331.339752] ? perf_event_for_each_child+0x82/0x150 [ 1331.344764] ? perf_event_for_each_child+0x82/0x150 [ 1331.349781] ? __mutex_lock+0xf7/0x1430 [ 1331.353758] ? perf_event_for_each_child+0x82/0x150 [ 1331.358774] ? perf_event_ctx_lock_nested+0x14d/0x2c0 [ 1331.363971] ? perf_event_for_each_child+0x82/0x150 [ 1331.368989] ? perf_trace_lock_acquire+0x4e0/0x4e0 [ 1331.373917] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 1331.379378] ? perf_event_ctx_lock_nested+0x117/0x2c0 [ 1331.384583] ? lock_downgrade+0x5d0/0x5d0 [ 1331.388729] ? lock_acquire+0x10f/0x380 [ 1331.392716] ? perf_event_ctx_lock_nested+0x39/0x2c0 [ 1331.397819] ? __perf_event_task_sched_out+0xec0/0xec0 [ 1331.403103] ? __perf_event_task_sched_out+0xec0/0xec0 [ 1331.408389] ? perf_event_for_each_child+0x82/0x150 [ 1331.413403] ? perf_event_for_each_child+0x82/0x150 [ 1331.418420] ? perf_ioctl+0x224/0x1b40 [ 1331.422307] ? __lock_acquire+0x56a/0x3fa0 [ 1331.426545] ? perf_event_set_output+0x450/0x450 [ 1331.431301] ? check_preemption_disabled+0x35/0x1f0 [ 1331.436321] ? perf_trace_lock_acquire+0x4e0/0x4e0 [ 1331.441255] ? check_preemption_disabled+0x35/0x1f0 [ 1331.446274] ? perf_trace_lock+0x11e/0x4e0 [ 1331.450507] ? check_preemption_disabled+0x35/0x1f0 [ 1331.455523] ? perf_event_set_output+0x450/0x450 [ 1331.460286] ? do_vfs_ioctl+0xabe/0x1040 [ 1331.464346] ? perf_event_set_output+0x450/0x450 [ 1331.469115] ? do_vfs_ioctl+0xabe/0x1040 [ 1331.473179] ? selinux_file_ioctl+0x116/0x590 [ 1331.477673] ? ioctl_preallocate+0x1e0/0x1e0 [ 1331.482086] ? selinux_parse_skb.constprop.0+0x16b0/0x16b0 [ 1331.487720] ? __fget+0x1ff/0x360 20:20:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000200)=0xc) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={r1, r2, r3}, 0xc) creat(&(0x7f0000000340)='./file0\x00', 0x2d) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r4, &(0x7f00000017c0), 0x0, 0x0) 20:20:57 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0xa, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x3}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40004}, 0x0) ioctl$sock_ifreq(r0, 0x8921, &(0x7f0000000040)={'ip6_vti0\x00', @ifru_addrs=@vsock={0x28, 0x0, 0x0, @hyper}}) [ 1331.491171] ? lock_downgrade+0x5d0/0x5d0 [ 1331.495317] ? lock_acquire+0x10f/0x380 [ 1331.499295] ? __fget+0x44/0x360 [ 1331.502669] ? check_preemption_disabled+0x35/0x1f0 [ 1331.507695] ? security_file_ioctl+0x7c/0xb0 [ 1331.512112] ? SyS_ioctl+0x7f/0xb0 [ 1331.515649] ? do_vfs_ioctl+0x1040/0x1040 [ 1331.519792] ? do_syscall_64+0x19b/0x4b0 [ 1331.523855] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 20:20:57 executing program 3: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, 0x0}, 0x4000010) 20:20:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4000000000004e20}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) 20:20:58 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14) sendto$packet(r0, &(0x7f00000002c0)="e4e9887d9f2a380f041e5464c072b2f59f087f9a592a0cffcfefa8dd01952aff5b6f3d462af968906acf20fbf933921cbdce3267c1e38d958c39b8ccf0cc285c513f22c184e6596fcf4aaf3cb5818612ce5156bd16c5247d199965f14efbb8bf12f2ff389603c9b9fdcfe0cc22c0c86c897a25978c13a68ec00a374cd83b74818d30496ca67d9ab6f4a59149708b0cbb6ab2d01c320158d88547a7ddddc45b6f41cf8d8817b0627656a0da73588eddf1c4ceae7ec1703af72e47ffb70cbd2f73412e", 0xc2, 0x0, &(0x7f0000000440)={0x11, 0x1b, r1, 0x1, 0xffffffffffffffff, 0x6, @local}, 0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x10001}, 0xffffffffffffff34) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000200)=""/58) r3 = accept(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, &(0x7f0000000080)=0x80) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14, 0x800) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000180)={r4, 0x1, 0x6, @local}, 0x10) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x10, 0x0, &(0x7f0000000240)=0xfffffffffffffecf) 20:20:58 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fchdir(r1) clock_gettime(0x0, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) write$input_event(r1, &(0x7f00000001c0)={{r2, r3/1000+10000}, 0x1f, 0x3bc, 0x3f}, 0x18) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000240)=""/110) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/current\x00', 0x2, 0x0) getpgrp(0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) write$apparmor_exec(r0, &(0x7f0000000200)={'exec ', '\x00'}, 0x6) write(r1, &(0x7f00000001c0), 0xfffffef3) read(0xffffffffffffffff, &(0x7f00000003c0)=""/156, 0x1b) [ 1331.892694] kauditd_printk_skb: 185 callbacks suppressed [ 1331.892703] audit: type=1400 audit(1554668458.095:56580): avc: denied { map } for pid=30062 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, [], [{0x7, 0xb8, 0x1ab4, 0x3, 0x7fff, 0x200}, {0x1, 0x80, 0x8, 0x2, 0x1, 0x9}], [[]]}) r2 = perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) r3 = socket(0x8, 0x1, 0x7f) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000180)={0x3b, @multicast1, 0x4e24, 0x3, 'wlc\x00', 0x32, 0xd, 0x4b}, 0x2c) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000280)={0x1, 0x10000}, 0x8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={r4, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000001c0)=0x3) [ 1332.065516] audit: type=1400 audit(1554668458.115:56581): avc: denied { map } for pid=30067 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:20:58 executing program 1: r0 = open(0x0, 0xfffffffffffffffe, 0x10) r1 = dup2(r0, 0xffffffffffffff9c) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$MAP_CREATE(0x0, 0x0, 0x0) fstat(r0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)={0x0, @aes256, 0x1, "b7552bd7bbac1651"}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x20000, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x6) add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r2, 0x402, 0x4) syz_emit_ethernet(0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd60093a0600428a082b00fe8000000000000000000000000000bbff020000000000000000000000000001fff500000008"], 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) fchdir(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x50, r3, 0x0) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r4, &(0x7f0000000d00), 0x400004e, 0x0) 20:20:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4000000000004e20}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) [ 1332.280107] audit: type=1400 audit(1554668458.125:56582): avc: denied { map } for pid=30067 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1332.337888] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1332.353054] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1332.358872] audit: audit_lost=824 audit_rate_limit=0 audit_backlog_limit=64 [ 1332.371482] audit: audit_lost=825 audit_rate_limit=0 audit_backlog_limit=64 [ 1332.378589] audit: backlog limit exceeded [ 1332.381616] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1332.390895] audit: audit_lost=826 audit_rate_limit=0 audit_backlog_limit=64 20:20:58 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/context\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x0, 0x5, 0xffff, 0x7f1, 0x2}) lseek(0xffffffffffffffff, 0x0, 0x4) 20:20:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4000000000004e20}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) 20:20:59 executing program 5: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x400, 0x0) accept4(r0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) rmdir(&(0x7f0000000240)='./file1\x00') fchdir(r1) lstat(&(0x7f0000000480)='./file1\x00', 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x44000, 0x0) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x120) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000140)={0x5, 0x0, 0x6}) 20:20:59 executing program 3: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, 0x0}, 0x4000010) 20:20:59 executing program 2: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, 0x0}, 0x4000010) 20:20:59 executing program 0: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, 0x0}, 0x4000010) 20:20:59 executing program 5: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x400, 0x0) accept4(r0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) rmdir(&(0x7f0000000240)='./file1\x00') fchdir(r1) lstat(&(0x7f0000000480)='./file1\x00', 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x44000, 0x0) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x120) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000140)={0x5, 0x0, 0x6}) 20:21:00 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0xff, 0x5, 0x1191, 0x7, 0x0, 0x5b123435, 0x2, 0x6, 0xffffffffffffffff, 0x8, 0xffff, 0x0, 0x1, 0xffffffffffffffff, 0x5, 0x7ff, 0x7fffffff, 0x80000001, 0x2, 0xa2, 0x0, 0x247, 0x1650000000000000, 0x6, 0x2, 0xd0, 0x20, 0x5, 0x2, 0x80, 0x7, 0x7, 0x4dff65e3, 0x7f, 0x3, 0x20, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000002c0), 0x1}, 0x156fcc3130dc95e0, 0x5, 0x3, 0x7, 0x6, 0x3, 0x7}, 0x0, 0xa, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="03001100"/20]) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000240)=0x7) listen(r0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RCREATE(r2, &(0x7f0000000180)={0x18, 0x73, 0x2, {{0x40, 0x1}, 0x200}}, 0x18) shutdown(r0, 0x0) write$P9_RSETATTR(r2, &(0x7f0000000280)={0x7, 0x1b, 0x2}, 0x7) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 1334.230224] ip6_tunnel: l0 xmit: Local address not yet configured! 20:21:00 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp6\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003e40)={'irlan0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000003f00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f0000003ec0)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000002a00080028bd7000fbdbdf2500000000", @ANYRES32=r1, @ANYBLOB="270007000900f274e2a51d27e296b3437b3469ae930c00"], 0x24}, 0x1, 0x0, 0x0, 0x20048084}, 0x1) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x28}}, {0x2, 0x4e23, @broadcast}, 0x200, 0x0, 0x0, 0x0, 0xffffffff7fffffff, &(0x7f0000000000)='veth1\x00', 0x7fffffff, 0xaf7, 0x959}) 20:21:00 executing program 3: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, 0x0}, 0x4000010) 20:21:02 executing program 1: r0 = open(0x0, 0xfffffffffffffffe, 0x10) r1 = dup2(r0, 0xffffffffffffff9c) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$MAP_CREATE(0x0, 0x0, 0x0) fstat(r0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)={0x0, @aes256, 0x1, "b7552bd7bbac1651"}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x20000, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x6) add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r2, 0x402, 0x4) syz_emit_ethernet(0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd60093a0600428a082b00fe8000000000000000000000000000bbff020000000000000000000000000001fff500000008"], 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) fchdir(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x50, r3, 0x0) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r4, &(0x7f0000000d00), 0x400004e, 0x0) 20:21:02 executing program 3: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, 0x0}, 0x4000010) 20:21:02 executing program 0: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, 0x0}, 0x4000010) 20:21:02 executing program 2: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, 0x0}, 0x4000010) 20:21:02 executing program 5: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x60, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) quotactl(0x4939, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000200)="edd7d3e53f49d93822dccc970dd57a4f7b607cbdab2508d0af62641ecadf8e3941654d37f48ad692b2a4e03bbe092c56f6998aacc2bd32813a7de37ec34e888750c489b4c60237983a3bd32c75fcebc4d45a01459fef3c1c9b537d7e5f2a75ac6ba95654d000bf362dc3eb00b2cd3e24d0a49ce6337699f8bfd8f33d62696efee805a0b7e308a7") 20:21:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40000, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000040)={0x6c, @multicast1, 0x4e20, 0x1, 'sh\x00', 0x11, 0x9, 0x36}, 0x2c) dup2(r1, r0) dup(0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000002c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x2) fcntl$setstatus(r3, 0x4, 0x4000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) write$P9_RSTATu(r5, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0xfffffc1d}]) truncate(&(0x7f0000000000)='./file0\x00', 0x100000001) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="24c7bcef1c492257de3244c73b20e34bb7a157eb4dec51faca3f72edcd88d10923ab1eae75a93514b51f31c91713f2b63755e6ed5d40f883954e0e8a1a282ea042dbff3f0b", 0x45, 0x0, 0x0, 0x0) 20:21:02 executing program 5: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x60, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) quotactl(0x4939, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000200)="edd7d3e53f49d93822dccc970dd57a4f7b607cbdab2508d0af62641ecadf8e3941654d37f48ad692b2a4e03bbe092c56f6998aacc2bd32813a7de37ec34e888750c489b4c60237983a3bd32c75fcebc4d45a01459fef3c1c9b537d7e5f2a75ac6ba95654d000bf362dc3eb00b2cd3e24d0a49ce6337699f8bfd8f33d62696efee805a0b7e308a7") 20:21:02 executing program 1: r0 = open(0x0, 0xfffffffffffffffe, 0x10) r1 = dup2(r0, 0xffffffffffffff9c) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$MAP_CREATE(0x0, 0x0, 0x0) fstat(r0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)={0x0, @aes256, 0x1, "b7552bd7bbac1651"}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x20000, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x6) add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r2, 0x402, 0x4) syz_emit_ethernet(0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd60093a0600428a082b00fe8000000000000000000000000000bbff020000000000000000000000000001fff500000008"], 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) fchdir(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x50, r3, 0x0) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r4, &(0x7f0000000d00), 0x400004e, 0x0) 20:21:02 executing program 5: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x60, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) quotactl(0x4939, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000200)="edd7d3e53f49d93822dccc970dd57a4f7b607cbdab2508d0af62641ecadf8e3941654d37f48ad692b2a4e03bbe092c56f6998aacc2bd32813a7de37ec34e888750c489b4c60237983a3bd32c75fcebc4d45a01459fef3c1c9b537d7e5f2a75ac6ba95654d000bf362dc3eb00b2cd3e24d0a49ce6337699f8bfd8f33d62696efee805a0b7e308a7") 20:21:03 executing program 0: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, 0x0}, 0x4000010) [ 1336.911868] kauditd_printk_skb: 454 callbacks suppressed [ 1336.911876] audit: type=1400 audit(1554668463.115:57035): avc: denied { map } for pid=30199 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:21:03 executing program 5: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x60, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) quotactl(0x4939, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000200)="edd7d3e53f49d93822dccc970dd57a4f7b607cbdab2508d0af62641ecadf8e3941654d37f48ad692b2a4e03bbe092c56f6998aacc2bd32813a7de37ec34e888750c489b4c60237983a3bd32c75fcebc4d45a01459fef3c1c9b537d7e5f2a75ac6ba95654d000bf362dc3eb00b2cd3e24d0a49ce6337699f8bfd8f33d62696efee805a0b7e308a7") 20:21:03 executing program 3: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') [ 1337.090610] audit: type=1400 audit(1554668463.115:57036): avc: denied { map } for pid=30198 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:21:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40000, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000040)={0x6c, @multicast1, 0x4e20, 0x1, 'sh\x00', 0x11, 0x9, 0x36}, 0x2c) dup2(r1, r0) dup(0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000002c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x2) fcntl$setstatus(r3, 0x4, 0x4000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) write$P9_RSTATu(r5, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0xfffffc1d}]) truncate(&(0x7f0000000000)='./file0\x00', 0x100000001) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="24c7bcef1c492257de3244c73b20e34bb7a157eb4dec51faca3f72edcd88d10923ab1eae75a93514b51f31c91713f2b63755e6ed5d40f883954e0e8a1a282ea042dbff3f0b", 0x45, 0x0, 0x0, 0x0) 20:21:03 executing program 2: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, 0x0}, 0x4000010) [ 1337.215664] audit: type=1400 audit(1554668463.115:57037): avc: denied { map } for pid=30200 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1337.320308] audit: type=1400 audit(1554668463.115:57038): avc: denied { map } for pid=30200 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:21:03 executing program 5: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x60, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@remote, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) [ 1337.512331] audit: type=1400 audit(1554668463.115:57039): avc: denied { map } for pid=30198 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1337.734644] audit: type=1400 audit(1554668463.145:57040): avc: denied { map } for pid=30198 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1337.783506] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1337.784758] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1337.793167] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1337.812353] audit: audit_backlog=66 > audit_backlog_limit=64 20:21:04 executing program 5: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x60, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000002c0)) 20:21:04 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40000, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000040)={0x6c, @multicast1, 0x4e20, 0x1, 'sh\x00', 0x11, 0x9, 0x36}, 0x2c) dup2(r1, r0) dup(0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000002c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x2) fcntl$setstatus(r3, 0x4, 0x4000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) write$P9_RSTATu(r5, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0xfffffc1d}]) truncate(&(0x7f0000000000)='./file0\x00', 0x100000001) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="24c7bcef1c492257de3244c73b20e34bb7a157eb4dec51faca3f72edcd88d10923ab1eae75a93514b51f31c91713f2b63755e6ed5d40f883954e0e8a1a282ea042dbff3f0b", 0x45, 0x0, 0x0, 0x0) 20:21:04 executing program 3: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') 20:21:04 executing program 0: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') 20:21:06 executing program 1: r0 = open(0x0, 0xfffffffffffffffe, 0x10) r1 = dup2(r0, 0xffffffffffffff9c) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$MAP_CREATE(0x0, 0x0, 0x0) fstat(r0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)={0x0, @aes256, 0x1, "b7552bd7bbac1651"}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x20000, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x6) add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r2, 0x402, 0x4) syz_emit_ethernet(0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd60093a0600428a082b00fe8000000000000000000000000000bbff020000000000000000000000000001fff500000008"], 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) fchdir(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000008, 0x50, r3, 0x0) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r4, &(0x7f0000000d00), 0x400004e, 0x0) 20:21:06 executing program 5: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x60, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 20:21:06 executing program 3: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) 20:21:06 executing program 2: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') 20:21:06 executing program 0: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') 20:21:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40000, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000040)={0x6c, @multicast1, 0x4e20, 0x1, 'sh\x00', 0x11, 0x9, 0x36}, 0x2c) dup2(r1, r0) dup(0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000002c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x2) fcntl$setstatus(r3, 0x4, 0x4000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) write$P9_RSTATu(r5, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0xfffffc1d}]) truncate(&(0x7f0000000000)='./file0\x00', 0x100000001) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="24c7bcef1c492257de3244c73b20e34bb7a157eb4dec51faca3f72edcd88d10923ab1eae75a93514b51f31c91713f2b63755e6ed5d40f883954e0e8a1a282ea042dbff3f0b", 0x45, 0x0, 0x0, 0x0) 20:21:06 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 20:21:06 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 20:21:06 executing program 0: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) 20:21:06 executing program 3: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) 20:21:06 executing program 2: setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0xc93546000212759, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) finit_module(r0, &(0x7f0000000380)='A-selfvboxnet0posix_acl_access/]\\keyring)systemvboxnet1#@[{trusted$!systemvmnet0]keyring-(\\\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="426a74b996c76bf3ccad4d6a3eb8989681731dd8ca43950a3d5e9ef0950c0d2e60c9a385c3d7cde7de0a4e39099d6a9bd8bc6034317817e57d3ec0ba66f59abb4e18a16db0e93364213f33596d5a"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_cancel(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x8001, r3, 0x0, 0x0, 0x3fe, 0x0, 0x3}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) syz_open_procfs(r7, &(0x7f0000000500)='net/udplite\x00') 20:21:06 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0)