0xc) 09:54:42 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) close(r0) 09:54:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05"], 0x1) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}]}, 0x8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) 09:54:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:42 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = socket$unix(0x1, 0x200000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x5) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 09:54:42 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) close(r0) 09:54:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05"], 0x1) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}]}, 0x8) write$cgroup_subtree(r1, 0x0, 0x0) 09:54:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:42 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = socket$unix(0x1, 0x200000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:43 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) close(r0) 09:54:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05"], 0x1) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}]}, 0x8) write$cgroup_subtree(r1, 0x0, 0x0) 09:54:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:43 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = socket$unix(0x1, 0x200000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x5) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 09:54:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:43 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) close(0xffffffffffffffff) [ 2076.853814][ T26] kauditd_printk_skb: 309 callbacks suppressed [ 2076.853830][ T26] audit: type=1400 audit(1565344483.740:80276): avc: denied { map } for pid=19416 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05"], 0x1) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}]}, 0x8) write$cgroup_subtree(r1, 0x0, 0x0) 09:54:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2077.042462][ T26] audit: type=1400 audit(1565344483.780:80277): avc: denied { map } for pid=19413 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2077.240412][ T26] audit: type=1400 audit(1565344483.790:80278): avc: denied { map } for pid=19416 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:44 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) [ 2077.416115][ T26] audit: type=1400 audit(1565344483.810:80279): avc: denied { map } for pid=19416 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:44 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = socket$unix(0x1, 0x200000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x5) [ 2077.619120][ T26] audit: type=1400 audit(1565344483.850:80280): avc: denied { map } for pid=19416 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05"], 0x1) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}]}, 0x8) write$cgroup_subtree(r1, &(0x7f0000000000), 0x0) 09:54:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2077.783110][ T26] audit: type=1400 audit(1565344483.850:80281): avc: denied { map } for pid=19416 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:44 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2077.928160][ T26] audit: type=1400 audit(1565344483.870:80282): avc: denied { map } for pid=19420 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2078.046370][T19452] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2078.066243][ T26] audit: type=1400 audit(1565344483.870:80283): avc: denied { map } for pid=19420 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:45 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = socket$unix(0x1, 0x200000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) [ 2078.091841][T19452] audit: audit_lost=1802 audit_rate_limit=0 audit_backlog_limit=64 09:54:45 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) close(0xffffffffffffffff) 09:54:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05"], 0x1) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}]}, 0x8) write$cgroup_subtree(r1, &(0x7f0000000000), 0x0) 09:54:45 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:45 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = socket$unix(0x1, 0x200000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:45 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05"], 0x1) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}]}, 0x8) write$cgroup_subtree(r1, &(0x7f0000000000), 0x0) 09:54:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:46 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) close(0xffffffffffffffff) 09:54:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:46 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)={0x20, 0x8000000000019, 0xffffffffffffffff, 0x0, 0x0, {0x8}, [@typed={0xc, 0x3, @u64=0x12}]}, 0x20}}, 0x0) 09:54:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:46 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 09:54:46 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:47 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 09:54:47 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000780)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, 0x0, 0xffffffffffffffff) setresuid(0x0, 0xfffe, 0x0) 09:54:47 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) socket$unix(0x1, 0x1, 0x0) 09:54:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:47 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 09:54:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:47 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:47 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) 09:54:47 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) 09:54:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 09:54:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:48 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:48 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) 09:54:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000340)=@delpolicy={0x50, 0x14, 0x101, 0x0, 0x0, {{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}, 0x50}}, 0x0) 09:54:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2081.927944][ T26] kauditd_printk_skb: 290 callbacks suppressed [ 2081.927966][ T26] audit: type=1400 audit(1565344488.820:80570): avc: denied { map } for pid=19787 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) [ 2082.157433][ T26] audit: type=1400 audit(1565344488.870:80571): avc: denied { map } for pid=19787 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2082.308284][ T26] audit: type=1400 audit(1565344489.110:80572): avc: denied { map } for pid=19795 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:49 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) [ 2082.451489][ T26] audit: type=1400 audit(1565344489.110:80573): avc: denied { map } for pid=19795 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:49 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) 09:54:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r3) recvmmsg(r2, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x7ffff000, 0x0) [ 2082.667460][ T26] audit: type=1400 audit(1565344489.110:80574): avc: denied { map } for pid=19795 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2082.872051][ T26] audit: type=1400 audit(1565344489.110:80575): avc: denied { map } for pid=19795 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2083.092367][ T26] audit: type=1400 audit(1565344489.130:80576): avc: denied { map } for pid=19796 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 09:54:50 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) 09:54:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:50 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) [ 2083.254015][T19825] audit: audit_backlog=65 > audit_backlog_limit=64 09:54:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2083.322723][T19825] audit: audit_lost=1804 audit_rate_limit=0 audit_backlog_limit=64 [ 2083.334645][ T26] audit: type=1400 audit(1565344489.130:80577): avc: denied { map } for pid=19796 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:50 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) 09:54:50 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xc2, 0x0) 09:54:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:50 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000002c0)=""/117, 0x75) 09:54:50 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) socket$unix(0x1, 0x200000000001, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) 09:54:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:50 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:51 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 09:54:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000240)={0x4, {{0x2, 0x0, @empty}}}, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080), 0x4) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x76, 0x200) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x2000)=nil, 0x1000) shmdt(r1) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x61) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='scalable\x00', 0x9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000001a40)='nv\x00', 0x3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 09:54:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 09:54:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:51 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 09:54:51 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 09:54:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:52 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) 09:54:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 09:54:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:52 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:52 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 09:54:52 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) 09:54:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:52 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 09:54:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:53 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 09:54:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:53 executing program 5: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:53 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) 09:54:53 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 09:54:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:53 executing program 4: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 09:54:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:53 executing program 5: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:53 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) 09:54:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:53 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 2086.984989][ T26] kauditd_printk_skb: 288 callbacks suppressed [ 2086.985002][ T26] audit: type=1400 audit(1565344493.870:80856): avc: denied { map } for pid=20237 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2087.186724][ T26] audit: type=1400 audit(1565344493.930:80857): avc: denied { map } for pid=20237 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:54 executing program 2: clock_adjtime(0x0, 0x0) 09:54:54 executing program 5: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:54 executing program 4: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 09:54:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2087.345593][ T26] audit: type=1400 audit(1565344493.940:80858): avc: denied { map } for pid=20237 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:54 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 2087.587455][ T26] audit: type=1400 audit(1565344493.940:80859): avc: denied { map } for pid=20237 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2087.745330][ T26] audit: type=1400 audit(1565344493.980:80860): avc: denied { map } for pid=20237 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2087.971846][ T26] audit: type=1400 audit(1565344493.980:80861): avc: denied { map } for pid=20237 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:54 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:55 executing program 4: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 09:54:55 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 2088.099696][T20264] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2088.109960][T20266] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2088.123533][T20264] audit: audit_lost=1808 audit_rate_limit=0 audit_backlog_limit=64 [ 2088.132988][T20266] audit: audit_lost=1809 audit_rate_limit=0 audit_backlog_limit=64 09:54:55 executing program 2: clock_adjtime(0x0, 0x0) 09:54:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:55 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 09:54:55 executing program 2: clock_adjtime(0x0, 0x0) 09:54:55 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 09:54:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:55 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:56 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) 09:54:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:56 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 09:54:56 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 09:54:56 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:56 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) 09:54:56 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 09:54:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:56 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 09:54:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:56 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:57 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 09:54:57 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) 09:54:57 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, 0x0, 0x0) listen(r0, 0x0) 09:54:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:57 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:57 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) 09:54:57 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 09:54:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:57 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, 0x0, 0x0) listen(r0, 0x0) 09:54:58 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:58 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) 09:54:58 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 09:54:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:58 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:58 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, 0x0, 0x0) listen(r0, 0x0) 09:54:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x2) 09:54:58 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:58 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) 09:54:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:58 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 09:54:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x3) 09:54:58 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) [ 2092.024112][ T26] kauditd_printk_skb: 289 callbacks suppressed [ 2092.024125][ T26] audit: type=1400 audit(1565344498.910:81149): avc: denied { map } for pid=20384 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:59 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 09:54:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:59 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:54:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x4) 09:54:59 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) [ 2092.226987][ T26] audit: type=1400 audit(1565344498.950:81150): avc: denied { map } for pid=20386 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2092.402212][ T26] audit: type=1400 audit(1565344498.960:81151): avc: denied { map } for pid=20384 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:59 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) 09:54:59 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) [ 2092.601510][ T26] audit: type=1400 audit(1565344498.960:81152): avc: denied { map } for pid=20384 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:59 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) [ 2092.756205][ T26] audit: type=1400 audit(1565344498.960:81153): avc: denied { map } for pid=20384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:54:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x5) [ 2092.923199][ T26] audit: type=1400 audit(1565344498.960:81154): avc: denied { map } for pid=20384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:54:59 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) [ 2093.155203][ T26] audit: type=1400 audit(1565344498.970:81155): avc: denied { map } for pid=20386 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:00 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) [ 2093.305279][T20417] audit: audit_backlog=65 > audit_backlog_limit=64 09:55:00 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) [ 2093.356708][ T26] audit: type=1400 audit(1565344498.970:81156): avc: denied { map } for pid=20386 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.360725][T20417] audit: audit_lost=1810 audit_rate_limit=0 audit_backlog_limit=64 09:55:00 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 09:55:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x6) 09:55:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:00 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:55:00 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) 09:55:00 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) 09:55:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x7) 09:55:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:01 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:55:01 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 09:55:01 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x0) 09:55:01 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}) 09:55:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x8) 09:55:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:01 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 09:55:01 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 09:55:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(r0, 0x0, 0x40, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000000bc0), 0x4000000000002e5, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000004e00)=[{0x0, 0x36b, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x18, 0x1, 0x1, [r1, r1]}}], 0x18}], 0x492492492492556, 0x0) 09:55:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x9) 09:55:02 executing program 2: clock_adjtime(0x0, &(0x7f00000001c0)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}) 09:55:02 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:55:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:02 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000002c0)=""/117, 0x75) 09:55:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xa) 09:55:02 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 09:55:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x5000000, 0xf0ffffff, 0x700000000000000, 0x0, 0x0, r1, &(0x7f0000000340), 0xfdef}]) 09:55:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xb) 09:55:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(r0, 0x0, 0x40, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000000bc0), 0x4000000000002e5, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000004e00)=[{0x0, 0x36b, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x18, 0x1, 0x1, [r1, r1]}}], 0x18}], 0x492492492492556, 0x0) 09:55:03 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:55:03 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 09:55:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xc) 09:55:03 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x200000000000, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x1001}}) 09:55:03 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:03 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:55:03 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 09:55:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xd) 09:55:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000440)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x10}, @mcast1, @local, 0x7, 0x9, 0x100000000, 0x400, 0x3f, 0x2000210, r1}) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000200)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200, 0x0) write$capi20(r2, &(0x7f0000000140)={0x10, 0x1, 0x5, 0x83, 0x3, 0x2}, 0x10) [ 2097.209448][ T26] kauditd_printk_skb: 309 callbacks suppressed [ 2097.209462][ T26] audit: type=1400 audit(1565344504.100:81408): avc: denied { map } for pid=20737 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:04 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) [ 2097.408458][ T26] audit: type=1400 audit(1565344504.140:81409): avc: denied { map } for pid=20737 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2097.571971][ T26] audit: type=1400 audit(1565344504.140:81410): avc: denied { map } for pid=20737 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:04 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) socket$unix(0x1, 0x1, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:55:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000300)={0x400000007b, 0x5, [0x11e, 0x0, 0xc001102c], [0xc1]}) 09:55:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xe) 09:55:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:04 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) [ 2097.725381][ T26] audit: type=1400 audit(1565344504.140:81411): avc: denied { map } for pid=20737 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2097.830958][ T26] audit: type=1400 audit(1565344504.180:81412): avc: denied { map } for pid=20739 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000440)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x10}, @mcast1, @local, 0x7, 0x9, 0x100000000, 0x400, 0x3f, 0x2000210, r1}) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000200)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200, 0x0) write$capi20(r2, &(0x7f0000000140)={0x10, 0x1, 0x5, 0x83, 0x3, 0x2}, 0x10) 09:55:04 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) socket$unix(0x1, 0x1, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:55:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xf) [ 2098.070365][ T26] audit: type=1400 audit(1565344504.190:81413): avc: denied { map } for pid=20744 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:05 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) [ 2098.171025][T20859] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2098.182073][T20864] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2098.231865][T20859] audit: audit_lost=1830 audit_rate_limit=0 audit_backlog_limit=64 [ 2098.233112][T20867] audit: audit_backlog=66 > audit_backlog_limit=64 09:55:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:05 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:05 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) socket$unix(0x1, 0x1, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:55:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x10) 09:55:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000440)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x10}, @mcast1, @local, 0x7, 0x9, 0x100000000, 0x400, 0x3f, 0x2000210, r1}) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000200)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200, 0x0) write$capi20(r2, &(0x7f0000000140)={0x10, 0x1, 0x5, 0x83, 0x3, 0x2}, 0x10) 09:55:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:06 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x11) 09:55:06 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, 0x0, 0x0) 09:55:06 executing program 2: syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:06 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000440)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x10}, @mcast1, @local, 0x7, 0x9, 0x100000000, 0x400, 0x3f, 0x2000210, r1}) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000200)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200, 0x0) write$capi20(r2, &(0x7f0000000140)={0x10, 0x1, 0x5, 0x83, 0x3, 0x2}, 0x10) 09:55:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x12) 09:55:06 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, 0x0, 0x0) 09:55:06 executing program 2: syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x13) 09:55:06 executing program 2: syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:06 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:07 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, 0x0, 0x0) 09:55:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)=0x0) io_destroy(r1) io_destroy(r1) 09:55:07 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x14) 09:55:07 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:55:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)=0x0) io_destroy(r1) io_destroy(r1) 09:55:07 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:07 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x15) 09:55:08 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:55:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)=0x0) io_destroy(r1) io_destroy(r1) 09:55:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x16) 09:55:08 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:08 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 09:55:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:08 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)=0x0) io_destroy(r1) io_destroy(r1) 09:55:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x17) 09:55:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2102.238178][ T26] kauditd_printk_skb: 362 callbacks suppressed [ 2102.238191][ T26] audit: type=1400 audit(1565344509.130:81735): avc: denied { map } for pid=21085 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:09 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="d3d2b93c05f19c0420cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYPTR64, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82efb510100010029a701efca44f937d0492482ba837296d961a642a2f3bf23d3c8112a40cd4968cab8ba6f8dae7e9143112511cb4c3b2f6780318b62a6771bd5ef452fc540b41fc1bba6197aa963516e44c4d87f442ae3766c00004a0ad4ecac599099bc46ded36bf7f2ca8d7ac18ec2f8bccbc1c7bba5ecabeda7815ed786e6e39341cb80e3be041b91ca9a624a2e8d89c6411090b2"], 0x0, 0xc8}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2102.481654][ T26] audit: type=1400 audit(1565344509.140:81736): avc: denied { map } for pid=21091 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:09 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:09 executing program 2: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) [ 2102.633233][ T26] audit: type=1400 audit(1565344509.160:81737): avc: denied { map } for pid=21085 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x18) 09:55:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000540)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad5357423b08db538753bcf550f05d219f8c6ca03228dd8d293261ba071190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x67}, {&(0x7f00000003c0)="b1252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d81b53e3fce25735962003d59c73b5c7e008a287d2a1d4", 0x30}, {&(0x7f0000000700)="c2e03ca050ae6e9864a1798b5cc6822a6179ef8da5cd850e45cd71cd4dfe222335695c1aa33ed46d46bd8b2e6cad6ddcf596", 0x32}], 0x3) sendmmsg$inet(r0, &(0x7f0000000b40)=[{{0x0, 0xfffffffffffffcfb, &(0x7f0000000200)=[{&(0x7f0000000100)="8cb08f70aca1f2e24e7dc4636db1607852800ad7239bfbb123065f68cd67943bc81a1d56defee801abbb295542689614ad3cf075062ecc8fff703998f05b4a75cd21c51a0cdf5c1d22ec6c88b2f328c35d2284ce373751008f2fe11265fc7b892d9211b9f2b8d60d65de6a11b376b8379dea0e24d9d54997f9b0c35fdbb691b6a85b1dd235877eaf2c6b56cdebc12feefdd198891969cc07ec80aa29bcc95a7fa0866e97a784c0ac21edab15d06cfb51b0f47e5f4404000000000000", 0xbc}, {&(0x7f0000000340)="4520d8c1ee8e08b9ee293229", 0x28c}], 0x2}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000500)='B', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000640)="6704848d55e654ad6f06f85d5c8caed968361a080c9a53252ca10c8e9f2257b4300eccf6f7e8f49e10382d24c8e304851ba9f674097b80c63dc396090a3762753a1400aba6fc2b7dcec89c4c03bb4f4a995e7f0d40", 0x55}], 0x1}}], 0x3, 0x40000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x100000000000011, 0x0, 0x0) 09:55:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)=0x0) io_destroy(r1) [ 2102.774737][ T26] audit: type=1400 audit(1565344509.200:81738): avc: denied { map } for pid=21091 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:09 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:09 executing program 2: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) [ 2102.959121][ T26] audit: type=1400 audit(1565344509.200:81739): avc: denied { map } for pid=21091 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x19) 09:55:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) io_setup(0x1, &(0x7f0000000080)) [ 2103.165882][ T26] audit: type=1400 audit(1565344509.200:81740): avc: denied { map } for pid=21091 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x1a) 09:55:10 executing program 2: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2103.401419][ T26] audit: type=1400 audit(1565344509.200:81741): avc: denied { map } for pid=21091 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:10 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) [ 2103.558003][ T26] audit: type=1400 audit(1565344509.210:81742): avc: denied { map } for pid=21093 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2103.707254][ T26] audit: type=1400 audit(1565344509.210:81743): avc: denied { map } for pid=21093 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:10 executing program 5: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open$dir(0x0, 0x0, 0x0) 09:55:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) io_setup(0x1, &(0x7f0000000080)) 09:55:10 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2103.868461][ T26] audit: type=1400 audit(1565344509.210:81744): avc: denied { map } for pid=21093 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x1b) 09:55:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) io_setup(0x1, &(0x7f0000000080)) 09:55:11 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:11 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x1c) 09:55:11 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='#'], 0x1) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:11 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x1d) 09:55:12 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:12 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:12 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x1e) 09:55:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='#'], 0x1) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:12 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:12 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x25) 09:55:12 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:13 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:13 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='#'], 0x1) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x2f) 09:55:13 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:13 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:13 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x70) 09:55:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:13 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='#'], 0x1) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:13 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xab) 09:55:14 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:14 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x10000}}) 09:55:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2107.273354][ T26] kauditd_printk_skb: 255 callbacks suppressed [ 2107.273370][ T26] audit: type=1400 audit(1565344514.160:82000): avc: denied { map } for pid=21550 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:14 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) [ 2107.441430][ T26] audit: type=1400 audit(1565344514.170:82001): avc: denied { map } for pid=21550 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:14 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, 0x0) 09:55:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xbc) [ 2107.631675][ T26] audit: type=1400 audit(1565344514.200:82002): avc: denied { map } for pid=21563 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2107.837423][ T26] audit: type=1400 audit(1565344514.200:82003): avc: denied { map } for pid=21563 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2107.944953][ T26] audit: type=1400 audit(1565344514.230:82004): avc: denied { map } for pid=21563 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:14 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x21d) 09:55:14 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, 0x0) [ 2108.052529][ T26] audit: type=1400 audit(1565344514.390:82005): avc: denied { map } for pid=21573 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2108.230974][ T26] audit: type=1400 audit(1565344514.410:82006): avc: denied { map } for pid=21573 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2108.379715][T21695] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2108.380585][T21696] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2108.386279][T21695] audit: audit_lost=1845 audit_rate_limit=0 audit_backlog_limit=64 09:55:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x281) 09:55:15 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, 0x0) 09:55:15 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x2e6) 09:55:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:16 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x10000}}) 09:55:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:16 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r0 = dup(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x323) 09:55:16 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r0 = dup(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:16 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x10000}}) 09:55:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000080)) 09:55:17 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x10000}}) 09:55:17 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r0 = dup(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x33c) 09:55:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) io_setup(0x1, &(0x7f0000000080)) 09:55:18 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:18 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1}}) 09:55:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x3c6) 09:55:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) io_setup(0x1, &(0x7f0000000080)) 09:55:18 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1}}) 09:55:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x4b9) 09:55:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:18 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20000120) 09:55:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:18 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1}}) 09:55:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) io_setup(0x1, &(0x7f0000000080)) 09:55:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000100000400000000000000000100f5fff30d00000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x0, &(0x7f0000000080)) 09:55:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2112.345907][ T26] kauditd_printk_skb: 301 callbacks suppressed [ 2112.345922][ T26] audit: type=1400 audit(1565344519.230:82296): avc: denied { map } for pid=21932 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='#'], 0x1) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) [ 2112.488592][ T26] audit: type=1400 audit(1565344519.270:82297): avc: denied { map } for pid=21932 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:19 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000020000000000000001000004000000000000000001000000f40d000000001fa55605f840c5382c5ecaec72ebf601de577a74360d0643cfe6470527c4586097ebc0aab390d763589bc80539f8429ca4d7c914ee24f5b033d3eb14abd33ca6f3fa0214a41547478e743bb4701e1c6fc06c94fd46070fb89fd23ea54217a6c593fd7ff4068a41d1f392b2bb97fa3be2a47e4e29ce0af5cd626675b3caab1bbf0df5ca50e084376ca41a0a1833a9eff6e13da69ea9a0dcce93a078"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1a5200, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="04002dbd7000fedbdf25010000000000000009410000004c00180000800173797a3100"/91], 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x4000800) [ 2112.600130][ T26] audit: type=1400 audit(1565344519.280:82298): avc: denied { map } for pid=21932 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x0, &(0x7f0000000080)) 09:55:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2112.774050][ T26] audit: type=1400 audit(1565344519.300:82299): avc: denied { map } for pid=21932 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2112.918511][ T26] audit: type=1400 audit(1565344519.310:82300): avc: denied { map } for pid=21932 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:19 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_pts(r1, 0x4000000000000002) r4 = dup3(r3, r0, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f00000000c0)={0xfffffffffffffffe, 0x3}) write$P9_RLCREATE(r0, &(0x7f0000000000)={0xfffffffffffffcbe}, 0x18) [ 2113.119815][ T26] audit: type=1400 audit(1565344519.320:82301): avc: denied { map } for pid=21932 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x2) 09:55:20 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x0, &(0x7f0000000080)) 09:55:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffffffffffcd, 0x24, 0x2, [@enum={0xa, 0x3, 0x0, 0x6, 0x4, [{0x3, 0x3}, {0xa, 0x3}, {0xd}]}]}}, &(0x7f0000000280)=""/129, 0x3e, 0x81, 0x1}, 0x20) [ 2113.295148][T22063] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2113.301286][ T26] audit: type=1400 audit(1565344519.360:82302): avc: denied { map } for pid=21932 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2113.356363][T22063] audit: audit_lost=1850 audit_rate_limit=0 audit_backlog_limit=64 [ 2113.407606][T22063] audit: backlog limit exceeded 09:55:20 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:20 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x3) 09:55:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, 0x0) 09:55:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nfsfs\x00') ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=""/4096, 0x6c, 0x1000, 0x1}, 0x20) 09:55:20 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x4) 09:55:21 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, 0x0) [ 2114.368030][T22190] loop2: p1 < > p4 [ 2114.372101][T22190] loop2: partition table partially beyond EOD, truncated 09:55:21 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x5) [ 2114.424631][T22190] loop2: p1 size 2 extends beyond EOD, truncated [ 2114.478780][T22190] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:21 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:21 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x81, 0x8000020000) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000400000000000000000000000000000000000000000000000000000015a97ad6000000000000000000000000000000000000000000000000ffffff7f0800000001000000000000000000000000000018018000000000000003000000000000000000000000000000000000000000000000000000000000000200000001000000001000000000000006000000000000008006000000000000080000000000000000000000000000000000000000000000000000000000000000ec0000000000000000000000000000000000000000000000e7ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200"/448]) 09:55:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x1, 0x0) 09:55:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x6) 09:55:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:21 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:21 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:22 executing program 4: 09:55:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x7) 09:55:22 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:22 executing program 4: 09:55:22 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x8) [ 2115.730791][T22491] loop2: p1 < > p4 [ 2115.761062][T22491] loop2: partition table partially beyond EOD, truncated 09:55:22 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x8000009) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f00000000c0)={0xb, 0x5d, 0x4, 0x4800}) [ 2115.807729][T22491] loop2: p1 size 2 extends beyond EOD, truncated [ 2115.845984][T22491] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:22 executing program 4: 09:55:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:23 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:23 executing program 4: 09:55:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x9) 09:55:23 executing program 4: 09:55:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xa) [ 2116.849580][T22613] loop2: p1 < > p4 [ 2116.857169][T22613] loop2: partition table partially beyond EOD, truncated 09:55:23 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000c600000001000004000000000000000001000000f40de3ffffff81a2411786422128fa67ef3525aa54ed7fc2f3ea34a276a8c9a03e4315427f19ddd81a8677257638a3895717655ead8c588a593178769cec8c283617a4a99112d1c680acffa3cbcfc8b9bc1a5b32d6ba24fd33ea075aa6555fb2c0f44360802f86cf92f92b6f69be56c2a897fe436fe9992bb2c59c73a241e7ce58c8058e3bb57e8622000000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2116.904277][T22613] loop2: p1 size 2 extends beyond EOD, truncated [ 2116.949024][T22613] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:24 executing program 4: 09:55:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r0, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfffffffffffffef4, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:24 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xb) [ 2117.385409][ T26] kauditd_printk_skb: 309 callbacks suppressed [ 2117.385422][ T26] audit: type=1400 audit(1565344524.270:82606): avc: denied { map } for pid=22682 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2117.559535][ T26] audit: type=1400 audit(1565344524.340:82607): avc: denied { map } for pid=22687 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:24 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) socket$kcm(0x2, 0x3, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') ioprio_set$pid(0x1, 0x0, 0x0) [ 2117.739238][ T26] audit: type=1400 audit(1565344524.340:82608): avc: denied { map } for pid=22687 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2117.850688][ T26] audit: type=1400 audit(1565344524.360:82609): avc: denied { map } for pid=22682 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:24 executing program 3: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r2 = dup2(r1, r1) timerfd_settime(r2, 0x0, &(0x7f0000000040)={{0x77359400}}, &(0x7f0000000080)) [ 2117.972050][ T26] audit: type=1400 audit(1565344524.360:82610): avc: denied { map } for pid=22682 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xc) [ 2118.031939][ T26] audit: type=1400 audit(1565344524.380:82611): avc: denied { map } for pid=22687 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2118.032662][T22693] loop2: p1 < > p4 [ 2118.072329][T22693] loop2: partition table partially beyond EOD, truncated 09:55:24 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) [ 2118.087626][ T26] audit: type=1400 audit(1565344524.390:82612): avc: denied { map } for pid=22687 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2118.181378][T22693] loop2: p1 size 2 extends beyond EOD, truncated [ 2118.213051][T22693] loop2: p4 start 1854537728 is beyond EOD, truncated [ 2118.231308][ T26] audit: type=1400 audit(1565344524.410:82613): avc: denied { map } for pid=22682 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:25 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) socket$kcm(0x2, 0x3, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') ioprio_set$pid(0x1, 0x0, 0x0) 09:55:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xd) 09:55:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r0, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 2118.472482][ T26] audit: type=1400 audit(1565344524.410:82614): avc: denied { map } for pid=22689 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:25 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:25 executing program 3: rt_sigaction(0x1d, &(0x7f00000000c0)={&(0x7f0000000040)="d28d08120000d9f63e660f5c52e20fe5673d440f4fe6c4021db62bdb47766726f3400faeb19bac0000c421bec21003f2e100", {0x3f7}, 0x10000000, &(0x7f0000000080)="c4037d39bf350000000ec401956d4699c4437d1df8f7c4e2793538c4217c50d5d3830000008046d85909c44178594802c4a3694932328f29f09aec"}, &(0x7f0000000280)={&(0x7f0000000140)="26410fd8c2c48245b6fac0a30000000002c4e22d16948c00000000f046f65100f30f1ed436f3a68f4830cf9d96bc00003fc46125f33f43c1b50008000008", {}, 0x0, &(0x7f0000000180)="0f039bd1b085f8f0839bcd74eb3391410f62a67ba007b667f2426cc46290f5e166652ef3440f2dfbc4e1f950ea3e8059211043d006c4e1fe2cff"}, 0x8, &(0x7f00000002c0)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000003c0)={0x18c, r1, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1800000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x600000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x44}]}, @TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff18f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x60}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffff2ce4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2a8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7a}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40b}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}]}, 0x18c}, 0x1, 0x0, 0x0, 0xe0f829f67ef0d5c8}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[], &(0x7f00000001c0)=""/129, 0x0, 0x81, 0x1}, 0x20) [ 2118.700234][ T26] audit: type=1400 audit(1565344524.410:82615): avc: denied { map } for pid=22682 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:25 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) socket$kcm(0x2, 0x3, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') ioprio_set$pid(0x1, 0x0, 0x0) 09:55:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xe) 09:55:26 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) [ 2119.264526][T22827] loop2: p1 < > p4 [ 2119.287990][T22827] loop2: partition table partially beyond EOD, truncated [ 2119.340867][T22827] loop2: p1 size 2 extends beyond EOD, truncated [ 2119.389017][T22827] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:26 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:26 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) socket$kcm(0x2, 0x3, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') ioprio_set$pid(0x1, 0x0, 0x0) 09:55:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xf) 09:55:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000000000000100000400000000000000000100f40d000000000000593c93a156c70d3de3ebbd2bbeef00cbf9b5ef31696b7ddd8d63c593000001f30000000000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r0, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) [ 2119.943569][T22946] loop2: p1 < > p4 [ 2119.948163][T22946] loop2: partition table partially beyond EOD, truncated 09:55:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/129, 0x32, 0x391, 0x1}, 0x20) [ 2119.995037][T22946] loop2: p1 size 2 extends beyond EOD, truncated [ 2120.045093][T22946] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:27 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x10) 09:55:27 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) socket$kcm(0x2, 0x3, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 09:55:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000080)=0xe8) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000140)={{0x3b, @loopback, 0x4e22, 0x1, 'wrr\x00', 0x0, 0x7, 0x18}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x1, 0x6, 0x8, 0x5}}, 0x44) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@mcast2, 0x4, r1}) 09:55:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x11) 09:55:27 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) [ 2120.739793][T22973] loop2: p1 < > p4 09:55:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) [ 2120.763059][T22973] loop2: partition table partially beyond EOD, truncated [ 2120.777694][T22973] loop2: p1 size 2 extends beyond EOD, truncated 09:55:27 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) socket$kcm(0x2, 0x3, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) [ 2120.807806][T22973] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:27 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x12) 09:55:27 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffc00, 0x101402) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000140)={{0x3, 0x0, 0x101, 0x2, 0x9}, 0xfffffffffffffffa, 0x1f}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000380)=ANY=[@ANYBLOB="01000500aaaaaaaaaaaaaaaaaaaaaa12ffffffffffffaaaaaaaaaa250180c200000f15411402584a58a7ec59269d713eeb85aa2b3d610d942fd7f6c1649fc2992f9c83f054b823f76450c0f5ddacbc2351c790176033b9f770d0cf1ed7ba4158f77bdd823307b43046d3beb3d22bebdfc0af437fa2d1f4e705afeb2e94f67dbd7c7f26bac88c3f3a9d62ebf12f9896faafd61036d67572910454d25f584f5529f793f6a909d7379f2dcd8b8aa074f7897bdb879988dc367594cdede4c9c4911cd311c8037912c8c8bdef0cb9903ae44e26b443"]) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000130000001800000018000000020000000000000201000004000000000000000001000000f40d00000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000002c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000300)=0x10) 09:55:28 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, 0x0, 0x0) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:28 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) socket$kcm(0x2, 0x3, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$kcm(0x29, 0x0, 0x0) [ 2121.639768][T23144] loop2: p1 < > p4 [ 2121.643710][T23144] loop2: partition table partially beyond EOD, truncated 09:55:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x13) 09:55:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) [ 2121.711696][T23144] loop2: p1 size 2 extends beyond EOD, truncated [ 2121.735682][T23144] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:28 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, 0x0, 0x0) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:28 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0xd, 0x81, 0x1}, 0x20) 09:55:28 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) socket$kcm(0x2, 0x3, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') 09:55:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x14) 09:55:29 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, 0x0, 0x0) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) [ 2122.397487][ T26] kauditd_printk_skb: 297 callbacks suppressed [ 2122.397501][ T26] audit: type=1400 audit(1565344529.280:82901): avc: denied { map } for pid=23324 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2400, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000280)={0x86, 0x3, 'client0\x00', 0x1, '\x00', "27afe7908cfafc26a50a573ca88c5eaf9a8d59cfeaeaeef43c74807671f6624c", 0x1237, 0x5}) 09:55:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x15) [ 2122.532026][T23329] loop2: p1 < > p4 [ 2122.535829][ T26] audit: type=1400 audit(1565344529.320:82902): avc: denied { map } for pid=23324 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2122.550234][T23329] loop2: partition table partially beyond EOD, truncated [ 2122.598096][T23329] loop2: p1 size 2 extends beyond EOD, truncated [ 2122.630636][T23329] loop2: p4 start 1854537728 is beyond EOD, truncated [ 2122.643158][ T26] audit: type=1400 audit(1565344529.320:82903): avc: denied { map } for pid=23322 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:29 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) socket$kcm(0x2, 0x3, 0x2) 09:55:29 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) [ 2122.765135][ T26] audit: type=1400 audit(1565344529.320:82904): avc: denied { map } for pid=23322 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:29 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x16) [ 2122.959573][ T26] audit: type=1400 audit(1565344529.340:82905): avc: denied { map } for pid=23324 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:30 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 2123.154678][ T26] audit: type=1400 audit(1565344529.350:82906): avc: denied { map } for pid=23322 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x4000) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) [ 2123.365490][ T26] audit: type=1400 audit(1565344529.360:82907): avc: denied { map } for pid=23324 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2123.473498][T23452] loop2: p1 < > p4 [ 2123.486229][T23452] loop2: partition table partially beyond EOD, truncated [ 2123.574890][T23452] loop2: p1 size 2 extends beyond EOD, truncated [ 2123.598537][ T26] audit: type=1400 audit(1565344529.360:82908): avc: denied { map } for pid=23327 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x17) 09:55:30 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) [ 2123.632123][T23452] loop2: p4 start 1854537728 is beyond EOD, truncated [ 2123.700078][T23461] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2123.721557][T23459] audit: audit_backlog=65 > audit_backlog_limit=64 09:55:30 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) close(r0) 09:55:30 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x18) 09:55:30 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:30 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x5, 0x0, 0x1, 0x791430fa}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f00000000c0)={0x0, r1, 0x2, 0x39f8}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:31 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) close(r0) 09:55:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x19) [ 2124.442869][T23581] loop2: p1 < > p4 [ 2124.460645][T23581] loop2: partition table partially beyond EOD, truncated 09:55:31 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) [ 2124.494530][T23581] loop2: p1 size 2 extends beyond EOD, truncated 09:55:31 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) close(r0) [ 2124.549370][T23581] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x1a) 09:55:31 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:31 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 09:55:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x1b) 09:55:32 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:32 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x80440) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000280)=""/230) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000cfee7279f5b89584f7ffffffffffffff01000000f40d00002200"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) fsync(r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000380)="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") 09:55:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) [ 2125.307646][T23709] loop2: p1 < > p4 [ 2125.311756][T23709] loop2: partition table partially beyond EOD, truncated 09:55:32 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) [ 2125.411926][T23709] loop2: p1 size 2 extends beyond EOD, truncated [ 2125.479015][T23709] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x1c) 09:55:32 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:32 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:32 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 09:55:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x1d) 09:55:32 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000180)=0xe5d6, 0x4) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000200000000000000010000040025bce3bca68f59ba000000f40d00000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2126.079784][T23833] loop2: p1 < > p4 [ 2126.084919][T23833] loop2: partition table partially beyond EOD, truncated 09:55:33 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(0xffffffffffffffff) [ 2126.126384][T23833] loop2: p1 size 2 extends beyond EOD, truncated [ 2126.150891][T23833] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x1e) 09:55:33 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[], 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:33 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(0xffffffffffffffff) 09:55:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x25) [ 2126.929383][T23904] loop2: p1 < > p4 09:55:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x256, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40080) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) [ 2126.974198][T23904] loop2: partition table partially beyond EOD, truncated 09:55:33 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:34 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(0xffffffffffffffff) [ 2127.051014][T23904] loop2: p1 size 2 extends beyond EOD, truncated 09:55:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x2f) [ 2127.127028][T23904] loop2: p4 start 1854537728 is beyond EOD, truncated [ 2127.363270][T23975] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2127.377902][T23904] __loop_clr_fd: partition scan of loop2 failed (rc=-16) [ 2127.420896][ T2512] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2127.422076][ T26] kauditd_printk_skb: 315 callbacks suppressed [ 2127.422089][ T26] audit: type=1400 audit(1565344534.310:83217): avc: denied { map } for pid=23993 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.431934][ T2512] Buffer I/O error on dev loop2p1, logical block 0, async page read 09:55:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 2127.467160][ T2512] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2127.482110][ T2512] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 2127.497727][ T2512] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2127.508808][ T2512] Buffer I/O error on dev loop2p1, logical block 0, async page read 09:55:34 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 09:55:34 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x95, 0x800) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000100)) [ 2127.523611][ T2512] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2127.535120][ T2512] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 2127.554050][ T2511] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2127.565096][ T2511] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 2127.574500][ T2511] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2127.585483][ T2511] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 2127.594373][ T2511] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2127.605814][ T2511] Buffer I/O error on dev loop2p1, logical block 0, async page read 09:55:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x70) [ 2127.614773][ T2511] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2127.625733][ T2511] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 2127.634598][ T2511] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2127.645668][ T2511] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 2127.654224][ T2512] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 2127.666637][ T26] audit: type=1400 audit(1565344534.330:83218): avc: denied { map } for pid=23993 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB], 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) [ 2127.767649][ T26] audit: type=1400 audit(1565344534.330:83219): avc: denied { map } for pid=23993 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:34 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:34 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x5, 0x31, 0x11, 0xa, 0xa, 0x6, 0x6, 0xbc, 0xffffffffffffffff}}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2127.915243][ T26] audit: type=1400 audit(1565344534.380:83220): avc: denied { map } for pid=23993 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2128.086870][ T26] audit: type=1400 audit(1565344534.520:83221): avc: denied { map } for pid=24077 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:35 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 09:55:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xab) [ 2128.270155][ T26] audit: type=1400 audit(1565344534.530:83222): avc: denied { map } for pid=24077 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:35 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) [ 2128.451267][ T26] audit: type=1400 audit(1565344534.560:83223): avc: denied { map } for pid=24050 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xbc) 09:55:35 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 09:55:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB], 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000200000000000000010000040000000000000000a24b2543da70074ce84fb9b8459e4aeb51ee3d49c88d30de247a70d6e6f4cf70795e209234c4819748420300"/93], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0xa00, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) sendto$netrom(r0, &(0x7f00000003c0)="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", 0xfa, 0x20008041, &(0x7f00000004c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default]}, 0x48) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000000)={0x3, "4eaf311b7dd3e6c7ca06db71629b928e3204612d399871744fb9ba86b06218c8", 0x3, 0x1}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r0, 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x80000, 0x0) [ 2128.736160][ T26] audit: type=1400 audit(1565344534.560:83224): avc: denied { map } for pid=24077 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:35 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 09:55:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x21d) [ 2128.891850][ T26] audit: type=1400 audit(1565344534.590:83225): avc: denied { map } for pid=24077 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2129.064983][T24430] loop2: p1 < > p4 [ 2129.081313][T24430] loop2: partition table partially beyond EOD, truncated 09:55:36 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) [ 2129.107463][ T26] audit: type=1400 audit(1565344534.650:83226): avc: denied { map } for pid=24050 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:36 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 2129.152076][T24430] loop2: p1 size 2 extends beyond EOD, truncated [ 2129.203798][T24430] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x281) 09:55:36 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x3ff, 0x10000) getsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:36 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 09:55:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB], 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:36 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x2e6) [ 2129.960367][T24563] loop2: p1 < > p4 [ 2129.966164][T24563] loop2: partition table partially beyond EOD, truncated [ 2130.023708][T24563] loop2: p1 size 2 extends beyond EOD, truncated [ 2130.054529][T24563] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:37 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x35e, 0x30000) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000380)=0x4, 0x4) creat(0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) fcntl$lock(r2, 0x27, &(0x7f00000000c0)={0x0, 0x3, 0x80000000, 0x0, r3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\x00', 0x1ff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) timerfd_settime(r0, 0x3f2f3afddfad73bc, &(0x7f00000002c0), &(0x7f0000000300)) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/397], 0x183) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000140)) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf, 0x1f, 0xfffffffffffffffd, 0x5c73}, 0xffffffffffffff46) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:37 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 09:55:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:37 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x323) 09:55:37 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 2130.689681][T24671] device nr0 entered promiscuous mode 09:55:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x33c) 09:55:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) [ 2130.762208][T24678] loop2: p1 < > p4 [ 2130.774705][T24678] loop2: partition table partially beyond EOD, truncated [ 2130.824033][T24678] loop2: p1 size 2 extends beyond EOD, truncated 09:55:37 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 2130.869514][T24678] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:38 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xc, [@int={0x6, 0x0, 0x0, 0x1, 0x0, 0x10, 0x0, 0xe, 0x2}]}, {0x0, [0x61, 0x0, 0x61, 0x30, 0x30, 0x0, 0x61, 0x807f, 0x2e, 0x0]}}, &(0x7f0000000280)=""/129, 0x34, 0x81, 0x1}, 0x20) 09:55:38 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 09:55:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x3c6) [ 2131.520175][T24805] loop2: p1 < > p4 [ 2131.524132][T24805] loop2: partition table partially beyond EOD, truncated 09:55:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) [ 2131.567620][T24805] loop2: p1 size 2 extends beyond EOD, truncated 09:55:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x4b9) [ 2131.629908][T24805] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:55:38 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:38 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 09:55:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000000c0)=0x10, 0x4) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000080)) 09:55:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20000120) [ 2132.303355][T24825] loop2: p1 < > p4 [ 2132.333306][T24825] loop2: partition table partially beyond EOD, truncated [ 2132.405194][T24825] loop2: p1 size 2 extends beyond EOD, truncated 09:55:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:39 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) [ 2132.453950][T24825] loop2: p4 start 1854537728 is beyond EOD, truncated [ 2132.460850][ T26] kauditd_printk_skb: 300 callbacks suppressed [ 2132.460863][ T26] audit: type=1400 audit(1565344539.340:83500): avc: denied { map } for pid=24842 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000029c2c00000000000149a9f8a6a3c76a000004e1090cae8d02f0ad70f03e0000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)) 09:55:39 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 2132.660822][ T26] audit: type=1400 audit(1565344539.340:83501): avc: denied { map } for pid=24842 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 2132.761533][ T26] audit: type=1400 audit(1565344539.340:83502): avc: denied { map } for pid=24842 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) [ 2132.908426][ T26] audit: type=1400 audit(1565344539.350:83503): avc: denied { map } for pid=24843 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x21) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) 09:55:39 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 09:55:39 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) [ 2133.014442][ T26] audit: type=1400 audit(1565344539.390:83504): avc: denied { map } for pid=24842 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:40 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01001800000005000000010000000000000000005954b64abd3620306e01963dd2b15e7b59ea071133e4df1dec5e031da27c00000000413813010000d00000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$nfc_llcp(r1, &(0x7f0000000440), &(0x7f00000004c0)=0x60, 0x800) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r3 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x5c52, 0x10000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f0000000300)=""/117) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x2, 0x70bd25, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x800) fcntl$setflags(r0, 0x2, 0x1) r4 = socket$pppoe(0x18, 0x1, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_opts(r5, 0x0, 0xb, &(0x7f0000000540)="d3bd0675cb0000000000c56df6e90b454f08d0980c498c1032b52f7a309c5ec7da1c2fb8cfb609b6a6afb0952b027fba261a36a3cdb81ee021ae6c14adc7fd83215d02d3bc362d83aaa9e4412caeaf6fde8f6c8ac577f46919d81c134b4637091f8aaba92c7fc1d956549e8ff4969d849a07b526baf3e2fb803c1c26fb4e081c0b2807c05506d86a7774e44299f3dd8be992aaea52838b63978ddc14098d0000b547a6e4aa6864c99cf632b51fac0949f3c78197f94cfafd30997efa204ac51b604807bb6e45c8de0378dc21c8771be067d8c6ab0f91be109b", 0x35) ioctl(r5, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") getsockopt$sock_buf(r4, 0x1, 0x1c, 0x0, &(0x7f00000000c0)=0x1e) mkdir(&(0x7f0000000040)='./file0\x00', 0x156) r6 = msgget$private(0x0, 0x1) ioctl$sock_TIOCINQ(r5, 0x541b, &(0x7f0000000500)) msgctl$IPC_RMID(r6, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000380)={0x100000001, 0x8, 0x7f, 0x0, 0x6, 0x4, 0x6, 0x39, 0x3, 0x0, 0x7f, 0x400, 0x0, 0x2, 0x3f, 0xffff, 0x81, 0x1, 0x8}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) [ 2133.065278][T24900] loop2: p1 < > p4 [ 2133.069290][T24900] loop2: partition table partially beyond EOD, truncated [ 2133.134726][T24900] loop2: p1 size 2 extends beyond EOD, truncated [ 2133.177981][T24900] loop2: p4 start 1854537728 is beyond EOD, truncated 09:55:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) [ 2133.247260][ T26] audit: type=1400 audit(1565344539.400:83505): avc: denied { map } for pid=24842 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 2133.428013][ T26] audit: type=1400 audit(1565344539.710:83506): avc: denied { map } for pid=24859 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:40 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 2133.598395][ T26] audit: type=1400 audit(1565344539.730:83507): avc: denied { map } for pid=24859 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:40 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x1d5, 0x2, [@func={0xe, 0x0, 0x0, 0xc, 0x3}]}}, &(0x7f00000001c0)=""/129, 0x26, 0x81, 0x2000000000000001}, 0x20) read(r0, &(0x7f0000000040)=""/153, 0x99) 09:55:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) [ 2133.755330][ T26] audit: type=1400 audit(1565344539.730:83508): avc: denied { map } for pid=24859 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:40 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) 09:55:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], &(0x7f00000001c0)=""/129, 0x32, 0x76, 0xffffffffffffffff}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000080)={0x0, 0x7fff, [0x4, 0x5, 0x0, 0xde0, 0x7f]}) [ 2133.937833][ T26] audit: type=1400 audit(1565344539.730:83509): avc: denied { map } for pid=24859 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:41 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 09:55:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 09:55:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000ff7f000000000000000200000007cfdc6f01000004000000000000000001000000000000000000"], &(0x7f00000001c0)=""/129, 0x29, 0x81, 0x1}, 0x20) 09:55:41 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:41 executing program 3: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001800000004000000000000000001000000f40d00"/50], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040), 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:41 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 09:55:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) clock_settime(0x3, &(0x7f0000000040)) 09:55:41 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x178, r1, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xdc, 0x1, [@TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x20, @mcast1, 0xfff}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @remote, 0x800}}, {0x14, 0x2, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffff6d6d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x401}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x5}, 0x4) 09:55:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 09:55:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040), 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:42 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 09:55:42 executing program 0: munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0xfffffffffffffe74, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xffffffffffffff5e) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) 09:55:42 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"/278], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x40) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000000c0)={0x200000000003c, 0x30, 0xa, 0x19, 0xa, 0x3, 0x4, 0x71, 0xffffffffffffffff}) 09:55:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040), 0x4) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00', 0x1001}) 09:55:42 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 09:55:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 09:55:43 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) 09:55:43 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r1 = dup(r0) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) 09:55:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:43 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 09:55:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, &(0x7f0000000140)) 09:55:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:43 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000140)=0x5599) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000040)=0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x292}}, &(0x7f0000000280)=""/129, 0x32, 0xfffffffffffffe6e, 0xfffffffffffffffd}, 0x20) 09:55:43 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev}}}, 0x84) 09:55:43 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x217, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="825c31c62989e30fbe00563192a96570f96ffca106a9944ec6878aa76ddd22b72690072a4785e00fe6d79612c1c699d32abc1356d8f1592641a6b185a2d34d15532e71087035d9d2809df5d6c0d3a5d70f835f0354ddb4ac2a80e5dc", 0x5c, 0x3}, {&(0x7f0000000100)="cb8044904f4049453467d4c6b0f951d94e82fd54fc4e250a20f0fc34334ac673c729b7f6e0e232824c2bc1cf50a4be6d9e76a5cc287243976612cf1198dea5abf9fcd3", 0x43, 0x578}], 0x80, &(0x7f0000000300)={[], [{@euid_eq={'euid', 0x3d, r0}}, {@context={'context', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@subj_type={'subj_type', 0x3d, 'proctrustedGPLeth0\'*'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '#vboxnet1'}}]}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 09:55:44 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) close(r0) 09:55:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, &(0x7f0000000140)) 09:55:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x6, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x3e, 0x7f]}}, &(0x7f00000001c0)=""/129, 0x28, 0x81, 0x1}, 0x20) 09:55:44 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev}}}, 0x84) [ 2137.551159][ T26] kauditd_printk_skb: 290 callbacks suppressed [ 2137.551173][ T26] audit: type=1400 audit(1565344544.430:83800): avc: denied { map } for pid=25704 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@fwd={0x2}]}, {0x0, [0x6f, 0x2e, 0x30, 0x2e, 0x30, 0x7f, 0x3e]}}, &(0x7f00000001c0)=""/129, 0x2d, 0x81, 0x1}, 0x20) 09:55:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1) 09:55:44 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) close(r0) [ 2137.735488][ T26] audit: type=1400 audit(1565344544.430:83801): avc: denied { map } for pid=25704 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'vxcan1\x00', 0x1}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) syz_open_procfs(r1, &(0x7f00000000c0)='net/raw6\x00') 09:55:44 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x6a, 0x8, 0x0, 0x9f5, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r1, 0xbc, &(0x7f0000000280)=[@in6={0xa, 0x4e20, 0x7, @mcast2, 0x1ff}, @in={0x2, 0x4e21, @rand_addr=0x2}, @in={0x2, 0x4e23, @rand_addr=0x5}, @in6={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x1f}, 0x1}, @in6={0xa, 0x4e23, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x7, @ipv4={[], [], @local}, 0x8}, @in6={0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffffffff}]}, &(0x7f0000000180)=0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000090000000000000001000000000000000000000001000000000000001c617f2e7f2e300000"], &(0x7f00000001c0)=""/129, 0x39, 0x81, 0x1}, 0x20) prctl$PR_GET_TIMERSLACK(0x1e) [ 2137.948364][ T26] audit: type=1400 audit(1565344544.480:83802): avc: denied { map } for pid=25707 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, &(0x7f0000000140)) [ 2138.093891][ T26] audit: type=1400 audit(1565344544.480:83803): avc: denied { map } for pid=25707 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, 0x0, 0x0) 09:55:45 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev}}}, 0x84) [ 2138.284445][ T26] audit: type=1400 audit(1565344544.500:83804): avc: denied { map } for pid=25707 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:45 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) close(r0) [ 2138.369097][ T26] audit: type=1400 audit(1565344544.500:83805): avc: denied { map } for pid=25707 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2138.565836][ T26] audit: type=1400 audit(1565344544.500:83806): avc: denied { map } for pid=25704 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x60100, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0x9b, "ffba4a57a75e33549e4f67d664aca3a2697811505a6242aa7f480deffd3ec6d8fec35b05e2b1f4d377bd54b8fe36d68e40c3f8e01ac0125cafe3a936aaf36910ad352eb28953154e5f437f2f520ef1fe11e72d84b6ec95f325ca6562bfda38515b6c74b0698c07711d9abfd0772ed7755141d0ed2d2e8378f80c4061d7aa8de42a8bd93d68e30de927a67e75484df98e30270f3a0b69c3d7fe4f6e"}, &(0x7f00000000c0)=0xa3) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r1, 0x1ff}, 0xc) [ 2138.619371][T25834] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2138.665606][T25839] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2138.666410][T25841] audit: audit_backlog=65 > audit_backlog_limit=64 09:55:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, 0x0, 0x0) 09:55:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x1a0}]) 09:55:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000300)={0x400000007b, 0x5, [0x11e, 0x0, 0xc0010117], [0xc1]}) 09:55:45 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(0xffffffffffffffff) 09:55:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000f3ffffff01000004000000000000000001000000000000000000"], &(0x7f0000000040)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000002740)='/dev/dsp\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000002780)={0x4, [0x6, 0x3f, 0x0, 0x3ff]}, &(0x7f00000027c0)=0xc) 09:55:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, 0x0, 0x0) [ 2139.414762][T25947] kvm [25922]: vcpu0, guest rIP: 0xfff0 ignored wrmsr: 0x11e data 0x0 [ 2139.454380][T25959] Dev loop2: unable to read RDB block 1 [ 2139.488888][T25959] loop2: unable to read partition table [ 2139.498103][T25947] kvm [25922]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 09:55:46 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(0xffffffffffffffff) [ 2139.534868][T25959] loop2: partition table beyond EOD, truncated [ 2139.567218][T25959] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:55:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) setreuid(r0, r1) 09:55:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000), 0x0) 09:55:46 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x3}}) ioctl$TIOCNOTTY(r1, 0x5422) 09:55:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x1a0}]) 09:55:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000100000400000000f40000000100000000000000000020e19ca37047f3e56d5cc7832d97d096bd2b7e1af1b9f79cc8378062b83b687a9fedc2e9296de91d85ad5866d2660e847671cc6f315e4747572832d5e1cbc77fb9546125adec518ba62eddb98f7d19186f56361d4966c2d4af18d6e268a04a0285bf6f233ac0af"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:47 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(0xffffffffffffffff) 09:55:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000), 0x0) 09:55:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@dmask={'dmask'}}, {@uid={'uid'}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/cachefiles\x00'}}]}) [ 2140.453285][T25991] Dev loop2: unable to read RDB block 1 [ 2140.477594][T25991] loop2: unable to read partition table [ 2140.484085][T25991] loop2: partition table beyond EOD, truncated [ 2140.526181][T25991] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:55:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x220100) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 09:55:47 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200000, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f0000000500)=[{&(0x7f0000000140)="e3a7f96dbc313e46b4223926742ff633c28781b72bc2e61d791c1ac07dd931a0385ceb7162618bc6c60241d2b52e4c7cae9aa29abe267996f51f1883568ae2d6188f9a790e2ebd4f3461b535", 0x4c, 0x1}, {&(0x7f0000000280)="95c0c5c2c600da4b8e8584a1b4f627e5ffcbcf19afeae6c2bf7dac009548794a1239050a2ebeeca8085a46966aa29eb00d4cbed44b09018bb51a75127e92b8b787f8fa5c7208a16a449d79f6968f3f", 0x4f}, {&(0x7f0000000300)="d7301af6ef1098cfea33cf6bd2129c88256803260f3152ca7f0169f422620e9d72ddf90b07c7237569b3d1694b3c665b6c4472ad2b266153e453f76149458b0f27e183a5377d83e9dd68649372d78c3afa5bfe5acac485fefea39c70f34bf29963886b356f4efb1f6345ef447d04e41ec4a6982ac90daadfec0767937a16d07939a75e8bfe1ec1ef78a630a6c9355276c0531a20382ca179fcbfacbaae22adc93f", 0xa1, 0xfffffffffffffff7}, {&(0x7f00000003c0)="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", 0xfa, 0x40}, {&(0x7f00000004c0)="5f323307c36ce4a56bcb2680b0677e4e0580a4afd8ff9452c9055f449fe314a9e2f00ff1", 0x24, 0xe15d}], 0x1a000, 0x0) 09:55:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@remote, @rand_addr="3ba9f59345007a49bd506a1f3fbe565c", @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200002}) 09:55:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x1a0}]) 09:55:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000), 0x0) 09:55:47 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200001, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000080)=0x7ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb016418000000000000001800000018000000020000000000000001000004000000000000000001000000000000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f00000000c0)={0x9, 0x3, 0x7, 0x400, 'syz0\x00', 0x1}) 09:55:47 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) readv(r0, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1) 09:55:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{0x0}], 0x1) 09:55:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) [ 2141.300972][T26120] Dev loop2: unable to read RDB block 1 [ 2141.306814][T26120] loop2: unable to read partition table [ 2141.333287][T26120] loop2: partition table beyond EOD, truncated [ 2141.362759][T26120] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:55:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{0x0}], 0x1) 09:55:48 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, 0x0) 09:55:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f6b010018abf1062f0001000000000000000400000000000000000000000001"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000), 0x0, 0x1a0}]) 09:55:49 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x402, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:49 executing program 3: lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) readv(r1, &(0x7f0000000000)=[{0x0}], 0x1) 09:55:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:55:49 executing program 1: io_setup(0x1, &(0x7f0000000080)=0x0) io_destroy(r0) io_setup(0x7, &(0x7f0000000000)) io_destroy(r0) 09:55:49 executing program 0: pipe(&(0x7f0000000040)) r0 = semget(0x3, 0x3, 0x8) semctl$GETPID(r0, 0x4, 0xb, &(0x7f00000003c0)=""/206) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) tee(r1, r1, 0x9, 0x9) 09:55:49 executing program 5: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0x19f23) 09:55:49 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400000, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000280)={0x5, 0x6, 0x0, [{0x0, 0x800000000002e7a, 0x1, 0x100, 0xb6, 0x2, 0x1f}, {0x80000001, 0x100000001, 0x80000000, 0x4, 0x1, 0x10000}, {0x0, 0x1, 0x40, 0x2, 0x7, 0x0, 0x8}, {0xff2e, 0x2, 0x8000000000000001, 0x2f, 0x1f, 0x400, 0x80000000}, {0x10000, 0xa4, 0x7be08bae, 0x5, 0x1, 0xd581, 0xffffffff00000001}, {0x80, 0x4, 0x100000000, 0x1, 0x6, 0x636, 0x6f}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) ioctl$TIOCCONS(r0, 0x541d) 09:55:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) [ 2142.559786][ T26] kauditd_printk_skb: 345 callbacks suppressed [ 2142.559803][ T26] audit: type=1400 audit(1565344549.450:84144): avc: denied { map } for pid=26308 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000), 0x0, 0x1a0}]) 09:55:49 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1de}], 0x3a8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 2142.731320][ T26] audit: type=1400 audit(1565344549.450:84145): avc: denied { map } for pid=26336 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2142.931473][ T26] audit: type=1400 audit(1565344549.450:84146): avc: denied { map } for pid=26336 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x260000, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000080)={{0x0, 0x21a0}, {0x3, 0x3}, 0xfffffffffffffffb, 0x7, 0x200}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r1, 0x318, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", "", "", ""]}, 0x2c}}, 0x4080) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000280)={0x1, 0x9, 0x100000001, 'queue0\x00', 0x7ff}) [ 2143.076439][ T26] audit: type=1400 audit(1565344549.490:84148): avc: denied { map } for pid=26308 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:50 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0x3, 0xfe) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@local, @in6=@ipv4={[], [], @broadcast}, 0x4e23, 0x4, 0x4e23, 0xb9b0, 0xa, 0x0, 0x20, 0x2e, 0x0, r1}, {0xeee, 0x101, 0x0, 0x0, 0x1, 0x100000000, 0x400, 0xa5}, {0xa3, 0x101, 0x401, 0x73e0a851}, 0xffff, 0x6e6bb3, 0x1, 0x0, 0x1}, {{@in6=@local, 0x4d4, 0x33}, 0x2, @in6=@local, 0x0, 0x3, 0x2, 0x9, 0xaf, 0x8, 0x8}}, 0xe8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="5e000000378792ba14b12fef190a049ed331ffb38f137a05dc9db2c0bcb7aee0b5172b5bb993d61af6bdabfb7ae06ba622decaa1a8f80c0b805bfb7ae7ad0b581888f46549b2764f77ee2c0be19e27ae9f3900"/98], &(0x7f0000000180)=0x66) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000500)={'filter\x00', 0x2, [{}, {}]}, 0x48) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000400)={r2, 0x3f}, &(0x7f0000000440)=0x8) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000480)={0x0, r0}) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x7fff, 0x1, 0x6, 0x2480000000000000, 0x42}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfffffffffffffe81, 0xfffffe1a, 0x2}, {0x0, [0x30, 0x7f, 0x7f, 0x0, 0x0, 0x5f, 0x7f]}}, &(0x7f00000001c0)=""/129, 0x14, 0x81, 0x1}, 0x20) 09:55:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) [ 2143.141816][T26503] Dev loop2: unable to read RDB block 1 09:55:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000300)={0x400000007b, 0x5, [0x11e, 0x0, 0xc0011022], [0xc1]}) [ 2143.220111][T26503] loop2: unable to read partition table [ 2143.252692][T26503] loop2: partition table beyond EOD, truncated [ 2143.263539][ T26] audit: type=1400 audit(1565344549.490:84149): avc: denied { map } for pid=26308 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2143.324107][T26503] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:55:50 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) [ 2143.461669][ T26] audit: type=1400 audit(1565344549.490:84150): avc: denied { map } for pid=26308 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2143.629248][T26605] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2143.639328][T26603] audit: audit_backlog=65 > audit_backlog_limit=64 09:55:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000), 0x0, 0x1a0}]) 09:55:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb0100500d00000000000018f50000000000000200a2ff00000000010000040000000000000000010000000000000000e7e23de80bca00352fd75ce3280ee114ab7680569716a4ae2175466148558f79906ff8c938273a4c3db801c41c7763e1ccb08cb88a487d15776891f982b5e5bf4abcf74fbb6be865b10216178c96e8d9b505d7b31a79ce8245d226c683daac85893b95913e6c9ab3722788f7f4553647f7614cca4de9b07b567df57e4b31448140a8d7071af60c09473df6558aeb70e41035c63c80bafb550566d9effb9db011283f9ad387cca0"], &(0x7f00000001c0)=""/129, 0xd8, 0x81, 0x1}, 0x20) [ 2143.673751][T26603] audit: audit_lost=1872 audit_rate_limit=0 audit_backlog_limit=64 [ 2143.684082][T26640] audit: audit_backlog=65 > audit_backlog_limit=64 09:55:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:50 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:55:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 09:55:50 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) [ 2144.270567][T26811] Dev loop2: unable to read RDB block 1 [ 2144.276244][T26811] loop2: unable to read partition table 09:55:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000fae6000000000000000100000400"/50], &(0x7f0000000380)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x4, 0x3}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r1, 0x8}, &(0x7f0000000300)=0x8) memfd_create(&(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 2144.357481][T26811] loop2: partition table beyond EOD, truncated [ 2144.363799][T26811] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:55:51 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:51 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:55:51 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) 09:55:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000", 0x30, 0x1a0}]) 09:55:52 executing program 0: r0 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000080)=0x6, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000020000000000000001000004000000000000000001000000000000000000e8eb1329e4cea1fc646a6ecb0175f754d8678c2838bf881dd057cb72c11e803239a04e9318c2cb8de0eb6a44c82d4198313398ca66ce799c61225224f413cd"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:52 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:55:52 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) 09:55:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) [ 2145.229334][T26846] Dev loop2: unable to read RDB block 1 [ 2145.249370][T26846] loop2: unable to read partition table [ 2145.283932][T26846] loop2: partition table beyond EOD, truncated [ 2145.326687][T26846] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:55:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f0000000040)=""/129, 0x32, 0x81, 0x10}, 0x20) 09:55:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000", 0x30, 0x1a0}]) 09:55:52 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) 09:55:52 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{}, {0x0}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000280)={r1, &(0x7f0000000140)=""/99}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:52 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 09:55:53 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000020000000000000001000004000000000005000001000000f40d00000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:53 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 09:55:53 executing program 5: ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) [ 2146.309431][T26970] Dev loop2: unable to read RDB block 1 [ 2146.325174][T26970] loop2: unable to read partition table 09:55:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfffffd37, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x2e, 0x0, 0x30]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1f, 0x6000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000}) r2 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000380)={r1, 0x80000, r2}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@union={0x6, 0x0, 0x0, 0x5, 0x4, 0x100}, @volatile={0x6, 0x0, 0x0, 0x9, 0x2}, @func={0xc, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x61, 0x0, 0x7f, 0x7f]}}, &(0x7f0000000280)=""/129, 0x42, 0x81}, 0x20) [ 2146.368665][T26970] loop2: partition table beyond EOD, truncated [ 2146.403768][T26970] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:55:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000", 0x30, 0x1a0}]) 09:55:53 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 09:55:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 09:55:53 executing program 5: ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) 09:55:53 executing program 1: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344], 0x0) 09:55:53 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000020000000000000001000004000000000000000001000000220020000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r2 = dup2(r1, r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') userfaultfd(0x80800) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f00000005c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x33c, r3, 0x201, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0xd4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x95d}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2000000000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_BEARER={0xa0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5e}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffe82}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe9a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1a37}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xafa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffc00}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x108, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x877}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf50c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x84c2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xce0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x58}]}]}]}, 0x33c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004001) 09:55:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) prctl$PR_MCE_KILL_GET(0x22) 09:55:54 executing program 5: ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) 09:55:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07006900"/72, 0x48, 0x1a0}]) 09:55:54 executing program 1: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344], 0x0) 09:55:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5, 0xffffffffffffffff}}, @fwd={0xd}]}, {0x0, [0x7f, 0x0, 0x61]}}, &(0x7f0000000280)=""/194, 0x41, 0xc2, 0x1}, 0x20) 09:55:54 executing program 0: sysfs$2(0x2, 0x0, &(0x7f0000000040)=""/22) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000100922c000000000000000001000000000000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2147.591849][ T26] kauditd_printk_skb: 348 callbacks suppressed [ 2147.591864][ T26] audit: type=1400 audit(1565344554.480:84493): avc: denied { map } for pid=27210 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:54 executing program 5: r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) [ 2147.773687][ T26] audit: type=1400 audit(1565344554.520:84494): avc: denied { map } for pid=27210 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:54 executing program 1: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344], 0x0) [ 2147.889270][T27216] Dev loop2: unable to read RDB block 1 [ 2147.895012][T27216] loop2: unable to read partition table [ 2147.948187][T27216] loop2: partition table beyond EOD, truncated [ 2147.969775][ T26] audit: type=1400 audit(1565344554.550:84495): avc: denied { map } for pid=27210 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) tkill(r1, 0x1000000000016) [ 2147.983140][T27216] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:55:54 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xa69, 0x40) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000000c0)={0xfffffffffffff001, 0x33524742, 0x2, 0x2f5, 0x1, @discrete={0x10001, 0x1}}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01007f00000000000be82b36d87f1f7844a3814af2a3228d37cb3bbc45cd00001000000010000000"], &(0x7f00000001c0)=""/129, 0x2a, 0x81, 0x1}, 0x20) 09:55:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x90000, 0x0) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000080)={0x3ff, 0x40, 0x3, 0x3ff, 0x3, 0xb87, 0x9}) 09:55:55 executing program 5: r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) 09:55:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07006900"/72, 0x48, 0x1a0}]) [ 2148.212542][ T26] audit: type=1400 audit(1565344554.570:84496): avc: denied { map } for pid=27210 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:55 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) [ 2148.430630][ T26] audit: type=1400 audit(1565344554.770:84497): avc: denied { map } for pid=27217 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2148.553774][ T26] audit: type=1400 audit(1565344554.770:84498): avc: denied { map } for pid=27217 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:55 executing program 5: r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) 09:55:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0xc}]}}, &(0x7f00000001c0)=""/129, 0x26, 0x81, 0x1}, 0x20) [ 2148.676709][ T26] audit: type=1400 audit(1565344554.790:84499): avc: denied { map } for pid=27217 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:55:55 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) [ 2148.740937][T27310] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2148.750321][T27313] Dev loop2: unable to read RDB block 1 [ 2148.769700][T27313] loop2: unable to read partition table 09:55:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000018000000b39b00000200000000000000010000040000000000000000e0bf04acc7000000f40d00000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x17, 0x109400) write$FUSE_STATFS(r0, &(0x7f0000000080)={0x60, 0xffffffffffffffda, 0x4, {{0x4, 0x5, 0x7f3c8390, 0x40, 0xb3, 0x6, 0xffff, 0x7fffffff}}}, 0x60) [ 2148.785178][T27310] audit: audit_lost=1875 audit_rate_limit=0 audit_backlog_limit=64 [ 2148.804589][ T26] audit: type=1400 audit(1565344554.790:84500): avc: denied { map } for pid=27217 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2148.820448][T27313] loop2: partition table beyond EOD, truncated [ 2148.888401][T27313] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:55:55 executing program 5: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) 09:55:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, &(0x7f00000001c0)=""/129, 0x1a, 0x81, 0x20000000001}, 0x20) 09:55:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) tkill(r1, 0x1000000000016) 09:55:58 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) 09:55:58 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x4b8, 0x4000) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000440)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9f476f7235a5743005addc3e2b18eb0000000000000000000010633a190cd8c1cba5aa0000001000000061fc0000000e11f2c94083780fa7c5085701000900000000d84dc0015cb0bcbd00000000d8d3296018d9592506010000800000000000000013c1b1a5ef206aeb063dfa4850933ea10c3c8d66220330bf235ed9af7761fe07853e0eb60211425cb6afc026d086e49edeff5612cb8a71d01169667feccb8d42d400000000ada0964faa04928f683785513e8c9e6b52343f04895d9bfc395367c936188a93b2b563f4ff41ee57118472f560f485bca7d5be423a0fb64859b780f1038b5e4cb4a3493825f4f504839eaa005336ee86475aaa5cac864532ffa90abff3466d2ef31bef8e9e9f26ee7cffc27b729d328230980ef1624c4d2dfdf913c0b54adcaa32369b2de0f32c47fdb726c3e87d7f1ec63efddf104eb70d2144eb03cbf9d6185793ec9059ab56840059d611d6"], &(0x7f0000000040)=""/129, 0x2a, 0x81, 0x1}, 0x3) socket$inet_udp(0x2, 0x2, 0x0) 09:55:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07006900"/72, 0x48, 0x1a0}]) 09:55:58 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2000, 0x0) write$UHID_CREATE(r0, &(0x7f0000000280)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000080)=""/125, 0x7d, 0x4, 0xff, 0xa361, 0x4}, 0x120) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f00000003c0)={0x7f, 0x100000000}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x80000000, 0x220000) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:55:58 executing program 5: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) 09:55:58 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB='U\x00\x00\x00'], 0x0) 09:55:58 executing program 5: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) [ 2151.351195][T27522] Dev loop2: unable to read RDB block 1 [ 2151.356833][T27522] loop2: unable to read partition table 09:55:58 executing program 3: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000280)={0xe8b, 0xfffffffffffffff9, 0x7ff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40000, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f00000000c0)=""/36, &(0x7f0000000100)=0x24) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x10) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e21, 0x8000, @ipv4={[], [], @multicast1}, 0x9}}, 0x7, 0x2c3, 0x10000, 0x6, 0x80}, &(0x7f0000000400)=0x98) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xfffffffffffffeb3, 0x2, [@typedef={0x6, 0x0, 0x0, 0x8, 0x5}]}}, &(0x7f00000001c0)=""/129, 0x26, 0x81, 0x1}, 0x20) 09:55:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2151.392513][T27522] loop2: partition table beyond EOD, truncated [ 2151.404077][T27522] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:55:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07006900"/84, 0x54, 0x1a0}]) 09:55:58 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB='U\x00\x00\x00'], 0x0) [ 2152.170932][T27680] Dev loop2: unable to read RDB block 1 [ 2152.176560][T27680] loop2: unable to read partition table [ 2152.230827][T27680] loop2: partition table beyond EOD, truncated [ 2152.257380][T27680] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 2152.608967][ T26] kauditd_printk_skb: 321 callbacks suppressed [ 2152.608982][ T26] audit: type=1400 audit(1565344559.500:84776): avc: denied { map } for pid=27762 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2152.651910][ T26] audit: type=1400 audit(1565344559.540:84777): avc: denied { map } for pid=27763 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2152.679152][ T26] audit: type=1400 audit(1565344559.540:84778): avc: denied { map } for pid=27763 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2152.703001][ T26] audit: type=1400 audit(1565344559.580:84779): avc: denied { map } for pid=27764 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2152.739189][ T26] audit: type=1400 audit(1565344559.630:84780): avc: denied { map } for pid=27765 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2152.795195][ T26] audit: type=1400 audit(1565344559.680:84781): avc: denied { map } for pid=27766 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2152.835982][ T26] audit: type=1400 audit(1565344559.720:84782): avc: denied { map } for pid=27767 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2152.877306][ T26] audit: type=1400 audit(1565344559.760:84783): avc: denied { map } for pid=27768 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2152.928381][ T26] audit: type=1400 audit(1565344559.820:84784): avc: denied { map } for pid=27769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2152.970856][ T26] audit: type=1400 audit(1565344559.860:84785): avc: denied { map } for pid=27770 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) tkill(r1, 0x1000000000016) 09:56:01 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x40, 0x40000) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000180)=0x10001) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x0]}}, &(0x7f00000001c0)=""/129, 0x33, 0x81, 0x1}, 0xfffffffffffffeb2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) write$selinux_access(r1, &(0x7f0000000080)={'system_u:object_r:policy_src_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0x6}, 0x4e) 09:56:01 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, 0x0) 09:56:01 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB='U\x00\x00\x00'], 0x0) 09:56:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x10000) 09:56:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07006900"/84, 0x54, 0x1a0}]) 09:56:01 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="550000009078"], 0x0) 09:56:01 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000140)={0x1, 0x607ff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000080)=""/18) 09:56:01 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, 0x0) [ 2154.506105][T27807] Dev loop2: unable to read RDB block 1 [ 2154.530213][T27807] loop2: unable to read partition table [ 2154.577756][T27807] loop2: partition table beyond EOD, truncated [ 2154.593681][T27807] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:56:01 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="550000009078"], 0x0) 09:56:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07006900"/84, 0x54, 0x1a0}]) [ 2155.249049][T27915] Dev loop2: unable to read RDB block 1 [ 2155.258032][T27915] loop2: unable to read partition table [ 2155.263830][T27915] loop2: partition table beyond EOD, truncated [ 2155.271005][T27915] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:56:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:04 executing program 0: 09:56:04 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, 0x0) 09:56:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000020000000000000001000004000000000000000001000000f40d00000000a8ca13ab1f4e52131074a091607d92e29aadb2f4993358338f1f3e510f385f040c03fa1d07f968b1942a3472ae9a67dfc6418c0b819705fac36bc45b6441"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:04 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="550000009078"], 0x0) 09:56:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) 09:56:04 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x0, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) 09:56:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010961d711d48c0f0318000000000000001800001c18020000000000000000f3f30d00000200e974b7"], &(0x7f00000001c0)=""/129, 0x39, 0x81, 0x101}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x3b8}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e21, 0x9, @rand_addr="664d520be1b62edc442e0813b411d45f", 0x3}}, 0x2, 0x6, 0x6, 0x800, 0x2}, &(0x7f0000000380)=0x98) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000000c0)="761e071146bcbbf8b0675ba2f8b6cf8248c1fe4e879bf819916707f87f9e61947bb6e0aac24e98e3c8b5c96b28eca66821b94694427676169b6c8a07c5b3d38bdcfb025a274ab9fa2411b491587b55109dc9839031286b78597892d904341976453ab5c74be5cf2b5caade0958fba5deb91df7fb15279bba890522382361f4e1aadb25db0faf3b71e74ab6b26ce152cb62826054cd96ea06a69c654c32") 09:56:04 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="55000000907800"], 0x0) 09:56:04 executing program 0: pipe(&(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100c4000000000000000057030d180000000200000000000000010000040000000000000000327f2055acb3eb0000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2157.619214][T27952] Dev loop2: unable to read RDB block 1 [ 2157.640510][ T26] kauditd_printk_skb: 103 callbacks suppressed [ 2157.640524][ T26] audit: type=1400 audit(1565344564.530:84889): avc: denied { map } for pid=27953 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2157.710830][T27952] loop2: unable to read partition table [ 2157.768256][T27952] loop2: partition table beyond EOD, truncated [ 2157.793136][T27952] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 2157.900894][ T26] audit: type=1400 audit(1565344564.530:84890): avc: denied { map } for pid=27953 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:04 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="55000000907800"], 0x0) 09:56:04 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x0, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) [ 2158.047275][ T26] audit: type=1400 audit(1565344564.530:84891): avc: denied { map } for pid=27956 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2158.192708][ T26] audit: type=1400 audit(1565344564.530:84892): avc: denied { map } for pid=27953 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2158.336350][ T26] audit: type=1400 audit(1565344564.530:84894): avc: denied { map } for pid=27956 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2158.385606][ T26] audit: type=1400 audit(1565344564.530:84893): avc: denied { map } for pid=27953 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2158.427671][ T26] audit: type=1400 audit(1565344564.530:84895): avc: denied { map } for pid=27956 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) 09:56:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000e901000004000400000000000001000000f40d00000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) sendfile(r1, r1, &(0x7f00000003c0), 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r2, 0x6}, 0x8) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4210000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00*\x00%\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="f3ff0800ffff0200ffffffff"], 0x24}, 0x1, 0x0, 0x0, 0x20004800}, 0x4) 09:56:05 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="55000000907800"], 0x0) 09:56:05 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x0, 0x0, "f6846c071e9bff1194d573e16d7a06827275697f4c1f07b23c0df9dbbdbbf81d"}) [ 2158.459670][ T26] audit: type=1400 audit(1565344564.530:84896): avc: denied { map } for pid=27956 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2158.494989][ T26] audit: type=1400 audit(1565344564.570:84897): avc: denied { map } for pid=27956 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2158.524205][ T26] audit: type=1400 audit(1565344564.570:84898): avc: denied { map } for pid=27956 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb2000180000000000000018000000182000000200000000000000010000000000000001000000f40d000000009a3e797f09c73051247bbd576b5e1cfced6c1edd08c00b45a2ab4cb845fcb02a4043e8f3c16ccfc2d761d8ba1c209e50bd16866fd28e61b0f3f77298f98b1bce02c5b68eac853a1903d56d64c97b81c6b477cda4f409a4edd10fb0833715a0f6d13a349a31ca337057982ac2e383eda549e9f2f12d1f7f2aff7fe615193a14d7a658d927610624e4d41f97c35c01e2628ba6f387b38b94664cf7cf29ebeb9f0ecc2e1d7f000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000040)="5148ca801248ff178b931bdd93eee0daabbfe721a7c47f56b9e5b8f407fd86e40040a9a737260298f0bffec323f0f263889d0acf", 0x34) 09:56:05 executing program 1: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:05 executing program 0: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x1c, 0x8000000080000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0xffffffffffff4bd4}, &(0x7f0000000140)=0x8) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000002c0)={0xe, 0x8, 0x5, 0xae15, 0xbb, "84b0094348ca6f304ab5bbc462f834f09458f106a7d52536635614b3b0b3ae92e7aa572175d1b122ba1c3d337496c6658a3b4bb770011b5545058ec3b6810df3fe532bacaabf14f9e75ba6fa212357551e0f801f96bacc9104269dc4fd80d66c05c9275a5198ea8d1729e2708f33e29d89c85d1bcc34c28e9fb4b219c78c4261154c44a76ea8f27fe45fdc1c03e619a2a645a16f18a972696bb94cd5be06f44c2f2cc42b3989d5642d2266266d5543053d60d8d5ef78fdf6729841"}, 0xc7) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r1, 0x7d46}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0xfffffffffffffec0, 0x81, 0x1}, 0x20) 09:56:05 executing program 5: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321212c2ae6696c65300a"], 0x10094) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0xb) [ 2158.679158][T28087] Dev loop2: unable to read RDB block 1 [ 2158.696273][T28087] loop2: unable to read partition table [ 2158.739706][T28087] loop2: partition table beyond EOD, truncated [ 2158.745920][T28087] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:56:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[], &(0x7f00000001c0)=""/129, 0x346, 0x81, 0x1}, 0x20) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 09:56:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) [ 2159.462562][T28269] QAT: Invalid ioctl [ 2159.506751][T28317] QAT: Invalid ioctl 09:56:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:06 executing program 5: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x19f23) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 09:56:06 executing program 1: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfdaa, 0xfffffffffffffff1, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = msgget(0x1, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000280)=""/247) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000080)) [ 2159.619199][T28305] Dev loop2: unable to read RDB block 1 [ 2159.627498][T28305] loop2: unable to read partition table [ 2159.689561][T28305] loop2: partition table beyond EOD, truncated [ 2159.726928][T28305] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:56:06 executing program 1: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000100000400001c000000000001000000f40d99e3f2c7016a3f1989c3350097b01900000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x4, 0x0) fchmodat(r0, &(0x7f0000000340)='./file0\x00', 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x8, 0x20, 0x9, 0x6, 0xafcf, 0x8, 0x0, {0x0, @in6={{0xa, 0x4e20, 0xffffffffffffff64, @ipv4={[], [], @multicast2}, 0x100000000}}, 0x1, 0x5, 0x2, 0xcaac, 0x2030}}, &(0x7f0000000040)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000140)={r2, 0x3}, 0x8) 09:56:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) 09:56:07 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={&(0x7f0000000080), 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x10, &(0x7f0000000180)={&(0x7f0000000040)=""/38, 0x26, r1}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:07 executing program 1: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:07 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) [ 2160.489335][T28470] Dev loop2: unable to read RDB block 1 [ 2160.511997][T28470] loop2: unable to read partition table 09:56:07 executing program 1: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) [ 2160.544326][T28470] loop2: partition table beyond EOD, truncated [ 2160.577771][T28470] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:56:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x111, 0x5}}, 0x20) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) 09:56:07 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xa, 0x8000) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000005c0)={0x8, 0x23c, 0xfffffffffffffffe, 0xb77, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000900)=@known='trusted.overlay.nlink\x00', &(0x7f0000000940)=""/167, 0xa7) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000a00)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000680)=0x100) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f00000004c0)={'irlan0\x00', 0x1f}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x2, @remote, 0x5}], 0x1c) mq_getsetattr(r0, &(0x7f0000000080)={0x4, 0x7, 0x5, 0xa0000, 0x3, 0x23, 0x1f, 0x5}, &(0x7f00000000c0)) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000640)={r0}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140)={0x6}, 0x4) 09:56:07 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) 09:56:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) 09:56:07 executing program 1: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000005", @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:08 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x0, 0x0, 0x2e, 0x2e, 0x0]}}, &(0x7f00000001c0)=""/129, 0xfffffffffffffe34, 0x81, 0x1}, 0xffffffffffffff54) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)="1d03557bea3b3917ba552e5f5060d8cc84167e1ab4aca81dab1929c38c24d0599c3d91f9c6e1500b01fb700d90850599d4567d4a17ef6aa5b01510561f128445521f21d8de39d8b7a3535b977a430505a26035a8", 0xe2, r0}, 0x68) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8000, 0x10000) r2 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x912, 0x220001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 09:56:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:08 executing program 1: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:08 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) 09:56:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) 09:56:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x35b, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81}, 0x20) pread64(r0, &(0x7f0000000080)=""/204, 0xcc, 0x0) 09:56:08 executing program 0: r0 = socket(0xa, 0x6, 0x80) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x0, &(0x7f0000000080)={0x1, 0x0, 0x4, 0x0, r1}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:08 executing program 1: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:08 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) 09:56:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:08 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfffffffffffffe75, 0x18, 0x5, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}, {0x0, [0x61, 0x5c, 0x61]}}, &(0x7f00000001c0)=""/129, 0x35, 0x81, 0x5}, 0x20) 09:56:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:56:09 executing program 1: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:09 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) [ 2162.650747][ T26] kauditd_printk_skb: 338 callbacks suppressed [ 2162.650760][ T26] audit: type=1400 audit(1565344569.530:85237): avc: denied { map } for pid=29059 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) 09:56:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/129, 0x1a, 0x81, 0x1}, 0x20) [ 2162.889317][ T26] audit: type=1400 audit(1565344569.530:85238): avc: denied { map } for pid=29038 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2162.996590][ T26] audit: type=1400 audit(1565344569.530:85239): avc: denied { map } for pid=29059 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:56:10 executing program 5: syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000100)) 09:56:10 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) [ 2163.174024][ T26] audit: type=1400 audit(1565344569.540:85240): avc: denied { map } for pid=29059 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200282, 0x0) shmget(0x0, 0x1000, 0x0, &(0x7f0000000000/0x1000)=nil) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=""/238, 0xee) [ 2163.309863][ T26] audit: type=1400 audit(1565344569.550:85241): avc: denied { map } for pid=29038 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb01001800000000ff00001800000018000000020000000000000001000004000000000000000001000000f40d00000000113240c0105cb266d4eb0a7519556e9340723821ebf6774453a0f1ab9c44f44885226f3f451764b56f2a945aa6db5663306227a41a7c1f221f8603f73d8cb344dc8bec5a0ffc5ccb70a42624b739dca4aa0a013565862e9b29812780aa89c9616dfa629386aef10cffb8e8fa1f528ee2a600e8656c072a48125566b9826761690bf7d6ad8d5ee8f160cce9c4ba3a4efdbbbcd3ca753a1cac772d0d8ba8360d754c716ade25a1516fa858919c8bef82d94d437501146ec0a2fe1332a508401f2042d24a68d2e6c7d1a47a12485a419442563921dd746456baf74094c989fa72a771a55af892befce996f61b21343cb569c478e8931f8a602632cc5d22dd1ef7fe393579e8a3dffca42ee8e1218d31a4"], &(0x7f00000001c0)=""/129, 0x87, 0x81, 0x1}, 0x20) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200000, 0x0) getdents64(r0, &(0x7f0000000280)=""/243, 0xf3) [ 2163.550511][ T26] audit: type=1400 audit(1565344569.560:85242): avc: denied { map } for pid=29038 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2163.654388][T29236] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2163.674255][T29239] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2163.723022][T29236] audit: audit_lost=1891 audit_rate_limit=0 audit_backlog_limit=64 [ 2163.731690][T29239] audit: audit_lost=1892 audit_rate_limit=0 audit_backlog_limit=64 09:56:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:10 executing program 5: syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000100)) 09:56:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:56:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/129, 0x1a, 0x81, 0x1}, 0x20) r0 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000002000), 0x80800) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x20000, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() getresuid(&(0x7f00000000c0), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) write$P9_RSTATu(r1, &(0x7f0000000300)={0x6b, 0x7d, 0x2, {{0x0, 0x55, 0x5, 0x2a, {0x0, 0x3, 0x4}, 0xa4380000, 0x5, 0x8000, 0x1, 0xa, '-vboxnet0\'', 0xd, '%-+vmnet0user', 0xa, '&.trusted`', 0x1, ')'}, 0x1, '/', r2, r3, r4}}, 0x6b) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000002040)) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0xffff, 0x56d, 0xfffffffffffffffc, 0x6, 0xeee4, 0x3, 0x5, 0x8, 0xffff}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000580)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000600)={0x13, 0x10, 0xfa00, {&(0x7f0000000380), r5, 0x2}}, 0x18) 09:56:10 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xa6201, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080)=0x1, 0x4) 09:56:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:11 executing program 5: syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000100)) 09:56:11 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) [ 2164.311222][T29471] Dev loop2: unable to read RDB block 1 [ 2164.327470][T29471] loop2: unable to read partition table 09:56:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082dbd7000ffdbdf25090000003000010008000100020000000c0007000000000028000000080001000a000000080002007300000008d74ef90c44a147b2ce180001000a00"], 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x8, 0x0, 0x0, 0x1, 0x0, 0x39, 0x0, 0x15, 0x3}]}, {0x0, [0x30, 0x7f]}}, &(0x7f0000000380)=""/4, 0x2c, 0x4, 0x1}, 0x20) [ 2164.357495][T29471] loop2: partition table beyond EOD, truncated [ 2164.412713][T29471] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 09:56:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}]) 09:56:11 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe800000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:11 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0f85403, &(0x7f0000000100)) 09:56:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x401, 0x101000) connect$netlink(r0, &(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfe}, 0xc) 09:56:11 executing program 3: r0 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@ax25={{0x3, @netrom}, [@bcast, @remote, @null, @remote, @rose, @rose, @default, @default]}, &(0x7f0000000000)=0x80) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="030007000002ff01070009007f0072b1363446f1070005000da627696a4072220ee44e1023a94c0732086efe5b23c852775d49579a3366c645b672aeffcc377254706cfb07aa45b72d1bc255a2623bb7"], &(0x7f0000000180)=0x16) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000002c0)=0x5) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000280)={0x9, 0x0, 0x1, 0x7, r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000af2ffff18000000040000000000000001000004000000000000000001000000f40d000000004b54da3d688e3580aae437acbcacd458048ad21ac7f1469f5ac3eeb19b533e9e9741bcb908786c27de03f7d766b5baaff19ea8588fad256b764ac4f07f9d0a016d307181c6da43babed7c10e1405dee6ca4c2089c8ee6d65d980bb9c039b265ac660b8582606f8770c5e2d30cfbdf615aa8734d91678dfa268c9885a6ab728efa0ed8069ff64d5d80bd973748630d2ea8b540439113b53a3b26e8f4691abe3a38114c44d5e38122c835bfe2d"], &(0x7f00000001c0)=""/129, 0x34, 0x81, 0x1}, 0x20) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0xe0, r2, 0x501, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1ac}, @IPVS_CMD_ATTR_DAEMON={0x7c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="d9c4dadd9675e523ed51bd021680d4dc"}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x7ff}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xbafb}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x2b}}]}]}, 0xe0}}, 0x4000) 09:56:11 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0f85403, &(0x7f0000000100)) 09:56:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}]) 09:56:11 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe800000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:14 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0f85403, &(0x7f0000000100)) 09:56:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = socket$inet6_sctp(0xa, 0x3f75cf6b6ceb7a22, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x236}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x6, 0x4, 0xfffffffffffffff7, 0x401, r1}, &(0x7f0000000140)=0x10) 09:56:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}]) 09:56:14 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe800000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f00000001c0)=""/129, 0x26, 0x81, 0x1}, 0x20) 09:56:14 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:14 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800000000000100010000000000010000040080000000000000410d2000f40d000000000000cecd8c54d9e5504b845b7a1486ebe5c5f3fd"], &(0x7f0000000280)=""/129, 0xfffffffffffffd03, 0x81, 0x1}, 0x20) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2000000000000, 0x101100) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x4, 0x0) 09:56:14 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) 09:56:14 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x1) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x9, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2167.776235][ T26] kauditd_printk_skb: 229 callbacks suppressed [ 2167.776248][ T26] audit: type=1400 audit(1565344574.660:85470): avc: denied { map } for pid=29739 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2167.806988][ T26] audit: type=1400 audit(1565344574.670:85471): avc: denied { map } for pid=29739 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2167.833311][ T26] audit: type=1400 audit(1565344574.670:85472): avc: denied { map } for pid=29739 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2167.859251][ T26] audit: type=1400 audit(1565344574.670:85473): avc: denied { map } for pid=29739 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:14 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:14 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) [ 2167.963284][ T26] audit: type=1400 audit(1565344574.670:85474): avc: denied { map } for pid=29739 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2168.112320][ T26] audit: type=1400 audit(1565344574.670:85475): avc: denied { map } for pid=29739 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2168.349311][ T26] audit: type=1400 audit(1565344574.950:85476): avc: denied { map } for pid=29753 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2168.476381][ T26] audit: type=1400 audit(1565344574.970:85477): avc: denied { map } for pid=29753 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2168.558072][ T26] audit: type=1400 audit(1565344574.970:85478): avc: denied { map } for pid=29753 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2168.601119][ T26] audit: type=1400 audit(1565344574.980:85479): avc: denied { map } for pid=29753 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000f14b352c09c9e7168b23d0f200020000000000000001000004000000000000000001000000000000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:17 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:17 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:17 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r1 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) 09:56:17 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) 09:56:17 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) 09:56:17 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) 09:56:17 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000"/51, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:18 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0) connect$rds(r0, &(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:18 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:18 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) 09:56:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000016) 09:56:20 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000"/51, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:20 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x100, 0x840) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x8000, 0x80000000, 0xcf, 0x1}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9fa0e6abf4a78d746305b3502c6db859314e52f4020035459d2d539d30656139aafc45b5c4f2dffbf684cc09d87972798e03da0c4d8755d1b19400e011ccda98e7223aaa48fb3d8a12e2c2faac3f297d855da4dd4cee62b7299fc58c8afb369b577434a182c955d6c7526eced13415c2ee6b272bbbc12791c937656a1c13d15cd8bd356a78bcbc9a576cb0dfae5c114bb8def8364a60b4f4ee12fcc04d11772d57d4e73f9c616fe1dbba0800ae1687c64a9e6956a5f88e9dd41c1a7df9b4222c60826566ca262f61b7ee8e532e844f3f7c78"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x3af, 0x81, 0x1}, 0x0) 09:56:20 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) 09:56:20 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:21 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000020000000000000001000004000000000000ff0001000000f40d00000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x145680, 0x0) getsockname$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)={0xfffffffffffffff8, 0xcd, "a3faec57cd7c5e6cc4c0bf45996e3014d67d7017e5b21c2ecacd8fa76dc6d6187d36bd4feb3fe5e8ca663689493c846e9632e30ab675aa9e95d27aceaafaa03a9da71dbcde12dc7bc7b48d6eef71a94b7c01883ce90d3dc5d8b1ff033f71d7541f1d69d758676150bb4d3c9f636f8f52a4ce38d15b7d954585d0f8d396c0001e0ba75820f0df9f07a9e9679eeb88c17e0da281229843b82bfe44702fbaf36b95cdb9af6fb40ded86391c1a7753c704216862eacc169f0bb8b355c07a0f55fbedd1ba0de3adf5276847ab80ac03"}) prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/86) 09:56:21 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000"/51, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:21 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x573, 0x4000) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x458585e3, 0x20000000, 0xffffffffffffffff, 0x7, 0x20, 0x8, 0xff, 0x1, 0x9, 0x4}, 0x10) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000280)={'nat\x00', 0x0, 0x0, 0x0, [], 0x9, &(0x7f0000000080)=[{}], 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x108) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000003c0)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) sendmsg$nl_netfilter(r1, &(0x7f00000019c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001980)={&(0x7f0000000440)={0x152c, 0x4, 0x7, 0x310, 0x70bd29, 0x25dfdbfd, {0x1, 0x0, 0x8}, [@nested={0xc0, 0x1c, [@typed={0x8, 0x43, @uid=r2}, @generic="37a290f060378532f888020b9a074bbe7ed616bd1475e8ef76e866ff8371d53ee5a02a1e5315f2924e461886f651b3ad1988d30d02b0f28b5d0d10500cc82fe12cf64799f08a9a19fd792edf5f4375954761003efbd30f8204a67b8afc20ea1faf38df13862371e608d462c78832a16a7eeb2ff0aea2aa3bd0cfcd06e6a3e3aa8b5182e8267ea85a1aa463da51a4f82822d7d25a502087ee3ba979fec0b1def3d4c7e5515bee6146a848146edea5c744e1ba"]}, @typed={0x8, 0x2b, @fd=r1}, @typed={0x8, 0x6a, @u32=0x40}, @typed={0xc, 0x2, @u64=0x8}, @generic="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", @typed={0x8, 0x32, @u32=0x4}, @nested={0x434, 0x81, [@generic="4535e05e211323159f163caa76fcbdc566e65abc39b0cfd820432322debd460ce1c626a43e1dfa738041966234c3b8f96bdc44ab07c36239c239bea047998c75daba4dceebd3500335fce4a945ec561ab8b20c9c20698084b3a2a5d6a113d77eea3eaa8ad7a8aafad68ffbfcf4e8dce3f3b226d7a421a6a8436b6fbe424cc631384a0b", @generic="cab1c2b428062c47d14347e6b7e8380d9ab8c3576c3272f15be4873ebe243a", @typed={0x8, 0xd, @pid=r3}, @generic="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", @generic="2a532ad81123c069c6d8505d1c9bc70eb091ac90fbf4f0584a3c8494986c112e597fe74898a94d3c60b1dbcab0304bd33e47cd7053f6b1873ad9bf5793a3710ea9b265b81e1d9158300c21d8ae8e0c7b3a07bd3037991ac3", @generic="445d5e12bf86691fbcf4bfd1da3641231699c7f46b4c1a36b7f3995a1c92e6d3d4c7c9d4e4daf1af6fa185a5eb0a190bcdd83de6f38bfd71bb7c11ef7491754d4e54097a600d0ec85b2d159cbca36a223201012646402b40b5b9f2bb079c7fa4bd5c358eb39de3ced10b2c36675a7a0c802a7fe95b31270b362e1a24b0f5e569e91f58e9713bb50a8b976fe30c0b8b23ee91719167239dae0b7e1086e6c9246d800602ee9fc5f8715ed0360bcc061b81e2ebb028d62fb94e26cdf9ffa35d79fe28013e426f521b016bd347bb229095488326b837c3f10da7ed75df7a90844669c302bdcb", @generic="b4ffe24451950e7897e4927cda09b1f2ff11a0cd90eb7f7ac4c2660ccdd47617bb714103f8c120f8d37a6b09c6c9badc4f518c4ccbccb33de83302557ce60c32837adc2d4b966a235937a19792038a136dc112a104c137f0e83b62c3b590fe2c0e0713afc1ce59f0de0f8ef366283ea9211f5a7e2fcfc29ba4d5b75adbb8ca7a4cd7833c1a541b77999268459197258d9c6419a0d4", @typed={0xc, 0x96, @u64=0x40}, @generic="bde86be60b779146ae2a36db30d0cd194edf6c12f0c212a66b2ee0a509c0461f30ca46f23fe07e8e497424e04d2bafbfb2e307e3d1d3610e4b03b3a592848309c89b9193ae39b7bebb3c6cd6c16a788df9b03be5c38aa7d98e5346cb1e41f0edf0672c02311ccf21d01ec4d73330602e6c668c9f626ed5055cdccb1034603757c4d0d8e15d2e1b7d6523a8b666325b43fea58d6ce77c382048a225e8fbd9882b7e8f0799", @typed={0x8, 0x6c, @ipv4=@multicast1}]}]}, 0x152c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40) 09:56:21 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) [ 2174.182791][ T26] kauditd_printk_skb: 131 callbacks suppressed [ 2174.182805][ T26] audit: type=1400 audit(1565344581.070:85611): avc: denied { map } for pid=30217 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:21 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2174.284054][ T26] audit: type=1400 audit(1565344581.070:85612): avc: denied { map } for pid=30217 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:21 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) [ 2174.357968][ T26] audit: type=1400 audit(1565344581.070:85613): avc: denied { map } for pid=30217 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2174.576595][ T26] audit: type=1400 audit(1565344581.080:85614): avc: denied { map } for pid=30217 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2174.750874][ T26] audit: type=1400 audit(1565344581.090:85615): avc: denied { map } for pid=30217 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2174.802698][ T26] audit: type=1400 audit(1565344581.090:85616): avc: denied { map } for pid=30217 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2174.846317][ T26] audit: type=1400 audit(1565344581.360:85617): avc: denied { map } for pid=30284 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2174.873090][ T26] audit: type=1400 audit(1565344581.370:85618): avc: denied { map } for pid=30284 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000016) 09:56:21 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffffffffff44, 0x18, 0x5, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x61, 0x7f, 0x5f]}}, &(0x7f00000001c0)=""/129, 0x35, 0x81, 0x1000000000000001}, 0x20) [ 2174.897851][ T26] audit: type=1400 audit(1565344581.380:85619): avc: denied { map } for pid=30296 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2174.921003][ T26] audit: type=1400 audit(1565344581.390:85620): avc: denied { map } for pid=30296 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:21 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, &(0x7f0000000100)) 09:56:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:21 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:21 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x8, 0x9, 0xaa93, 0x1f, 0x7, 0xfffffffffffff800}) 09:56:22 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:22 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x100) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000020000000000000001000004000000000000000001000000000000000010"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) fstat(r1, &(0x7f0000000280)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x4e24, @broadcast}}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000140)={0x11, @time={0x77359400}, 0x6, {0x6, 0x7}, 0x8000, 0x2, 0x81}) 09:56:22 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:22 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000100)) 09:56:22 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000016) 09:56:22 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001400)='/selinux/checkreqprot\x00', 0x4, 0x0) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000080)=0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) write$P9_RREAD(r0, &(0x7f0000000280)={0x100b, 0x75, 0x2, {0x1000, "2154ecd94628b3251e3f292eef909ac8766a0c72e75309562e52c051e2d8851cc223c3fe060e0d69b41b572fb5016b5a6f8f79b0931a2fa49843b507522d9e4999ef934748b8a046346a6dc9e2b0f262aaf80ca3f919b4931993d25a567b0e6dbd74c3d09326edf7ee41b47ef7970edeee81c3cee5b445cab130202ca9c94cacf59f19fef819c5b356ae15487696e0e1209d4e0c2846c9c8efcfd3ce1d8367d6b219e35a3867f0e8b966baa90d7c5fd0e068001e677e1e60d7577f10b5781a2c3c5cf26259178f287dde591da9a2f9d414bec562852f8f906afb5ef957e2688522c458845850281383af050a3f22cac0bdfeaf4a52d1194bb19990087251951d8d3dcc306256a814d75e59aa063d4fe676af4e9d152cec3eccf7ce7c74baaedbb8635a749fea8526265022de16ba0cb67cf1902a8ba6717b3fb97833fac636cb91c7534a8974785dbf15a8d8af0993d0a5dded39d4b5a01d7f54b310eecaabccead6769baa927c02bcd4c1acfc2eec9c2242e4ed4c8000ff9d2bf7a44a8376b3d9244f1c977c7eb408a2c8db89ef6a7a1f4414573335876666434173ae8c750b3a86ae34be65e3758f17a2d3005df5452f6053d2a698c22d1124ef90a64b651e5dbf6479016e7abe81d7f24149b2aceaeb4a76fc98190715001c32cfa30d93c66184423674f343a699bdcc0addf17a2d4e05632c0cfb77f7a8a0201d506f2e4f52c7386fae8433d47a44cee74254114d52072cfdb4134340bfcad120720a83f45cfac86b3ce2834131976e0bdb399653037275b85dd2efa6e2bb6b655baac84bb3e33b7e7203f6fcc14478233694d06bcf26971643639318fb2daf0e662b07b52591b6346188dabe5da982a3a088922236f7495eefb4e9ab557c26a484824aaec0e641ebfc59e9b41bf45aaca5b5dde64252d4e237c62016f7beaa1a092839036ab38b5d0fd47cbcd1d30d2324a1ee2003462aa84d73f8fc096271f94e0ecbb2baf331e6f89390b16ec5a3e627b42a549f218e4a2e47382cefa2049b0b965fa18904496e165dcc5ec31565a96583eeb464af916a7d3dbc32766d8bea8d45c82d47315f9b94fce3305d62492e99b03f0fb752e6a0edcce40a2cfa5584605c804da945698615443cc11e19e87bc36bdf97b2215d4e9acb73ed3c8f91c6ed44bfb8175bf7ce0985e67355e8c6aa88266b8649622d8e4f8c4ea896524ceb74ccb25ea99c56fa6deb786b7655d7b54bb6127d64732ecb604ec6a6b62b25f75e4e644b85916ce94874db0ffc785b3c5e9039c69f5010cc916dd5296e93285472dc816fad959d5d56af23e02c9f965a249cf8dee158ec5f12aff2fb1084e4fbeecf6dd9f67ae2d53bca76b4d1ca0e6e273baaedf59ee17d67f8922ddc656aed6a9e670378ef3d25c6adfc41ceb77d8d8b75117fe59e5c7da49ec432a204891435db8f293b13e44fcf60b24b4a19408c47838bf88d9a0406345729f5554df3ef7affce9dce1ccce80f678a66e21f3b9f370c476c981f41029f1d593cde51e98c885632401cf557d142dd720dab089a6fb767720dbd7b8803c9807c8e1375061619b675bd4e82d1db128261c9ec65398e3f851a0565d59a0b0eb02b3836487549c0cfab6e782cdf6aaee490f83e25360130f4a267bdfb4ac9bb371abecb67ddb7e727dbecaadbce83cf886a976de7b65fe94247519645ace0c1eac81f0ddcaefd862b511e6f978c4ee8ed6e4fa49328848481f1a4d140d8d1892576cb31f76f92f171ea6bd4368addd751adad22361210a34884aa564dd174ece7c4f4ff78d286b5c4797b3270fc6b51205a9506af28adb623fb936f65bb32c3c85dbcadbc128f9a123546ebbe81fc99c50898bbf9341aa4a4546ebe5c66fa3047937908e7ba473696add171e18e585f6c7c1d5243fa4e10770a96efad5fd50efe10e87a37f228b48095b93e1d171cffadb0daf15ca4a0c659c62d103423bfa8f78d8ec342e99aebc0d3c34ace5baf4f4a714a511ec339b59f665e8fd57b793621d2cc88cfeb2446f0adbac2b4c9534fa1ab6fa6911265dd52ad254fd7691d101e3000e9b9d22b2b9ba0f0edec3f19cc39553e74e492f9b498a9b5929e63ed9cae94257bca8a86d3e8cc77353e292046653573438d34cd232a3889bbe5031b4bad7a1c414b8b85ec25b73140f3aa272410c7f19495d2f623aea25ad31ed00f1b431c6b1aeaab167d23fdf20e523af7fd3a7d2e86bc2b3acb45002ae5cc3ce8f52cf3e5fe25e69eb80ca8cd5dfb822ca72c896131867445bd4715936fcd5e32f6239e1e22db58302aa0a045a9d4fd2e35c14a5a01bbc33aab4078235343234c7329a20627e44c1ea095f69549dc1d3226335e70adffe221a6322c6ce38cd1facda9874f9b3aab4c8fe7df8253e7a6bd56a82e7ed5223ea38cb8fd6b354bb893d4cc30bee5ada82b1c530ffba820b37ca071e81d65234812b145a006c687f84dcaf8718b87ea2e52c85f0621e2710911d12ca7d24ab1ccbb7b754f8a738008e558602300da21441bf5ff17e2658969d3a4b544e704f7aa75c834764d77ecd46c12ec2fd5cd4293582174cd12f2606cb8fc8a93c0fe426f2f976fc8ce32e624c41c7305ae26f64e1cacb5b0d4616faa1339a3da161c10368ae63db6ff1a2f706f146b2088da030d2a0a36c248046c39b05351b9a5ce4a890e5325330fab6506c1f6927df817144b5e4de08663e1d540bc117cc15dff5bfff0c3f403b5f2afd74d7ab9ad6657684618b754039d4d72e4316749c6d9939689bbc39a7ecf30b2bdb5bc6791a9b5c84af32321723c894c68b74085a6211b8a4d6e85e2802030cbe05c732d00ab5f4fbd33d28509ead5213748983c42c3aa4a23e4f12fbe96f75eea4032a4f92fa236d613ab292f123f3cd3578604d0ca92ed86226da22466bacfa679f1d4b52ea1d722d6106925643ab606a0a6672ba4ba5f3c47f0ca2a5fb0554e096790b00e8b89c9421864e7fd0c5c076a2a51e6493c5ac47247e43f6cba648bf5c0b3c01b61a89622b09e6ef6f2c556947fdc5cb41eacf930d9ac919666d47b54f46fbcd3907960073251174162e65c03fb73c104b4424e16a44e0b6b301dbd36e90461c083e6fab7fd6cc161b174dc7e79041bdeedccae035fcde7736aaca5db550667e9b5ecc6b35b63e028a32de1f37606c292647903f6349b44c67fac99dbe1e28bce0668a8ed037c78c9fc4dfe068fd19eaeab41706466fff1ed76a61c04f11f8cdefd5597b3ccd0b2127e9e1b41e86122ce52e0d962cba994645df7cfa723b6c2b6773a19a2757d9ecd876e4b47ebdaf11b51e9e9d31cb06febeb3304d19818f3b28ee9b105a7f7ec0dd0ba6720350e63fbc0584444b867ee5a7d144160cb4d51c16a8075b9715ec7a4f523382faa059bc4120c1d5e5726ebe6e3c7316980afb12af7b1051aa5a6be84f7d38d77df8730ba16ffa9f876fa1f4a2886aa78770122e7fa035ffacb55226ddbda31f7dac31a7ed1b970e1f4b36bdc9021e4f0ea9a8cf5e1fbf7b83a2215ece0a45cf82c0eab35333efa1ad88f738b8ea9eed886f4ffd9a7afd850d7bbff269bbf69aa58a3408a2905596ce207316a78d39b79c03c38f516f15a28b86a9c3e5f5bd7834db8f8207486115a4d4b9fe3c53b53d7a87a0ad8979cd4fd843de51db1c6af102ccad8de40c4a99e85f69ecf9867cabf74eb85506a0f1dbc58269b450c237b9d0ddbdb9dfdb2cda335658de36bbbfa9ac42e3e0531966bf06de77a2d97516cc7649b17e4aef0a3e35b96c482749c9c290360333c9c35e22dc77c8b269ce968d8d1ab536c8a33f9f6e5d0066fda45dcf4088f95bb43df42c15c5ef82ca62ff1d4c95e4a5e41be76a7df0ac1dcd266d0f2ab9ade7c2667dc207f63aa5ea1e7b564cd474eaba2da2bd064ccb97cc05bf95067e9e23caf94462d6bf0d1d571eaadea4c47f8b31cf5c67c9ee3272f4459f652afba63c47024bc56d8a469e2df5552147ddc1a25c1c5f5b9f5a0de07eb04362c89b5a1ad0c3a396dbe2e734310a62ecade6a0d6f519a930998c90365ca4aa290f2b898de46e9b2ac1afdc09a1d976d599012993092db7383bb4a1311eb29276dbc9ab9d8f394659974e7780b8286fce3fbe6fd90e60bf83699024cd82567f9907e27518e1fc7931961fa634bf0bfe38703f47b85268509ffde37677759a1bb01f0c45de2553c38a0edd2ddd629416511036c8a55138823fa294bb97641e790bc221b1fb5dfb777e705a7afb6000a957bf7465ff18843c533476b498d25d35035137f72455da8f5d1772351b04f4ed3d8d897a3f83b588dbd278b3afa5c1c6324eb6f2ef3b77bf091d1c150020a7551d016c938347de105b1094380f904c3463dae0ad2fc21b87d2fdc0b8cbeab48fc633b35ebd5ec075512fc31b902ecff7fb4bfdd44b41e29eb6ac497ef9f2534f5fa343342c2e3a05594b44b68396eb8102e96c808b022ed032ced5789736cc3ad7525b5ba2e5f04eeb3e514ca3d47d55ea55d06be942dbb087d747f20fe9ed477255a56059253c866190fffc9fcb3bb7e58738945e69544416225797c749ad53ec8dccc625a9423df6e067bb6489223db29404172bceb7f7891e1a37951c7adaff4583a00cea6829bd37eca2a24539c3499db2b83fb266b718cb0d292e6778dab21e167ebfc79569fdba17d922bf62b42db686d53e7d77e1ae91b20b7e02a4df12d8235cd70b22d23d09c929e2269da68fc6bf4465f9b59028514b4a222e1b9271385fdb575d64c89e2fc95874d19a499644c1d719a693235c002ce072bec9ae9cbfcb89160a9e5a6894debc734f81b87a4b497f7b3e6a0f62e381d2e478ec1cd8d0ab1eec97518a6f9cccb5f7477a3f0372bc763c7699972ace15857dbe376a03d106a76102fc0c4a04678e4ea4940656addf2354c7b05758017cf9ae79320150f6b0dbad8c208c7fcac398b689ec242fb6396a456effabd53557e8738cf8e07d7103dd158c7e4b512932e7c9eb8c03d2d1baac82096399bfdcee2161be33624378e57b1aa81306a4fc3174aeb88328e9ce63f4a4038b2f78dad7f54bc6c5b3c4647f2c36770fb784335d496f8c7ba091449a2eaad282a1528774c499e2cfe556042cae6cea2608d4af05e41c7f532ef3b92f743131dcb1e00064d45d69bec7d71fcf015adf3f6ef5d4b3dc8644850bed43a2bab48dc9a76774b9deed1aa49eb9d6eedcc7594ec510071b817320bd4fe7b97dcad0f82f347820559890bbc74072b6c169c50cfbeab6ede9b5a43da632a5f1a541f953a1a2b88383618091f3e3b999d20b518ecd0992acc7f08099fa44facd873bdddc5c635b55435acf72b4b3868b01ec4045bddada26720bbce0e2d3464decfd2ff14cf612a91b32c1a7330e69884213c1ce9fc53abfd98dfc9d6628f97c1d33e46eec39290c9408ce4c1c7fb6b68489adf631720fd0863c7e6e047857d87baafafe6e98c5ae7ae265ea677ae624e4971912fc4fd93f3a1709c3a6098318bc6c60d3914ed3d1d8345b855a154d1a37df3bc6abca7c07d98783c01dec8e5df50d8ed2b0de00b7d031df2b13a7d410a089b5d75ff6a1309e9c057ab12465692b44c67cf977266b413dbf8ec33e784794d51845c0bd544188ca6a3b055d95348deb10682047eae3de5c647dec42e2617abb5c97ae0a37874ff6a1124a7e3ef3195d39bb8e3fed147fac797ca6c325a5dc73d32f56cbf0281b4aa249b1b82632f14e52d9dcd8a8efabefc9f45af6a44cf54e001bfd970a7a3769e755bd99ac48bb96eb7215e7c6a7b987f73"}}, 0x100b) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000001300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x804000}, 0xc, &(0x7f00000012c0)={&(0x7f0000000180)={0x30, r1, 0x300, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x100000000, 0x7, 0x80000001, 0x9}}}, ["", "", ""]}, 0x30}}, 0x4000000) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000001340)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000001380)=r2) 09:56:22 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000100)) 09:56:22 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e23, 0xa172, @mcast2, 0x9}}, 0x6, 0x22}, &(0x7f0000000400)=0x90) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000380)={r1, 0x6}, &(0x7f00000003c0)=0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) mount$9p_xen(&(0x7f0000000040)='\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000140)={'trans=xen,', {[{@access_client='access=client'}], [{@subj_user={'subj_user', 0x3d, 'vmnet0#'}}, {@hash='hash'}, {@dont_measure='dont_measure'}]}}) 09:56:22 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:23 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f0000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:23 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000100)) 09:56:23 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000020000000000000001000004000000000000000001000000f40d00000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000080)={0x3, 0x76d3, 0x9, 0x3}) 09:56:23 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, 0x0) 09:56:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:23 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:23 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f0000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfffffffffffffea0, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/129, 0xfffffd3d, 0xfffffffffffffe61, 0x1}, 0x20) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x8000, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) r1 = accept(r0, &(0x7f00000000c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x5, 0x100000000]}, &(0x7f0000000180)=0x8) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f00000002c0)) 09:56:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', 0x0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:23 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, 0x0) 09:56:23 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f0000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5500000090780000"], 0x0) 09:56:24 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0xc0f85403, 0x0) 09:56:24 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0xaf02, 0x0) 09:56:24 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/129, 0x1a, 0x81, 0x1}, 0x20) r1 = dup(r0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x8, 0x7ff, 0x6000000000, 0x3ff, 0x20, r1, 0x8, [], 0x0, r1, 0x5, 0x5}, 0x3c) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x8) 09:56:24 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000280)="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") 09:56:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x100000000000021c}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 09:56:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sched_setattr(0x0, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1c8) sendfile(r1, r2, 0x0, 0x10000) 09:56:24 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0xaf02, 0x0) 09:56:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000f71708000018000000020000000000e00400000000000000000100000001000000000000000000a8489367181e86a4cdb9db8a3f868dd043b11b6c8b4994f511ab944fde8687edc81e9ae8eff9429b8762f3aec7f115bd9292d700b69be72c764b7a5cc9f0a45a2d421b51468f1800b69d6a03722ad999a8cb07e25b0055b18188f257e3c9bd7f295d9bd6a6c6d215cb0fff82990df333564450b42233a642af05dbe2559d2d1c4cb37605ddfee53a2d96879c10e5908701262ab37a5c51b04a5295254025c222e6eb48dd65345c04f35ff2caefa4b797dcc29927b2a9f5b9b064b461c30f7d982a874f8a182e36e25d368d5f3682f574cdc91e78f8deafd8d71465b4453f9d83483bee5acfd0591c35e37e7f00357e349ae8ea25e11b5452ae7a39795c27b4aae963a2d822649522f7182f718386367313cb00e86bba8ccd4ae2f8"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x100) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000280)={0x100000001, 0x3, 'client0\x00', 0x4, "a6261c4bb8b2dd7e", "f7fb4915dea371ed216a91cd0461d9d6b97c26a166d7062965d900fa71978465", 0x8, 0x8}) 09:56:24 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0xaf02, 0x0) 09:56:24 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x113, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r1, 0xd, "fe496e", "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"}}, 0x110) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], &(0x7f00000003c0)=""/129, 0x3e7, 0x76, 0x1}, 0x20) 09:56:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:25 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 09:56:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) 09:56:25 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:25 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(0xffffffffffffffff, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 09:56:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x4, 0x0) bind$unix(r0, &(0x7f0000000340)=@abs={0x1, 0x0, 0x4e23}, 0x6e) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x78) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r1, r2) 09:56:25 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01500018000000000000002302000018000000020000000000000001000004000000000000000001000000f40d000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:25 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) [ 2179.234100][ T26] kauditd_printk_skb: 329 callbacks suppressed [ 2179.234114][ T26] audit: type=1400 audit(1565344586.120:85950): avc: denied { map } for pid=31279 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:26 executing program 0: 09:56:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) 09:56:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100151bbca4400bad911800000018000000020000000000000001000004000000000000000001000000f40d00000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@empty, @in=@local}}, {{}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) [ 2179.381230][ T26] audit: type=1400 audit(1565344586.150:85951): avc: denied { map } for pid=31279 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:26 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2179.523513][ T26] audit: type=1400 audit(1565344586.160:85952): avc: denied { map } for pid=31279 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:26 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(0xffffffffffffffff, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) [ 2179.721944][ T26] audit: type=1400 audit(1565344586.180:85953): avc: denied { map } for pid=31279 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:26 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x5, 0x0, [], [{0x3, 0xff, 0x200000000000, 0x1, 0xffffffff, 0x7}, {0x2, 0xffffffffffffffff, 0x0, 0xf8, 0x80, 0x1}], [[], [], [], [], []]}) 09:56:26 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2179.902672][ T26] audit: type=1400 audit(1565344586.190:85954): avc: denied { map } for pid=31279 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2180.029231][ T26] audit: type=1400 audit(1565344586.200:85955): avc: denied { map } for pid=31311 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) 09:56:26 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000580)={0x0, 0x80}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r1, 0x4}, &(0x7f0000000640)=0x8) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000892b6168f1a73b100000020000000000000801000004000000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) getsockopt(r3, 0x1, 0xc0, &(0x7f0000000380)=""/91, &(0x7f0000000400)=0x5b) vmsplice(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="2165be150f31bcab009c734cbd6f6e86a037edcddd1a4ce1281f713489b5852c99bd69e91402741bf3a3d17ba537e805bc3c47dbb50980fca74df4a44c6ecc0f8d223a502ae695c6edbdb510b80b2cee7ed2fa4131e7f33aa5937a0cb8dcf2ae19e172821f1bdb40605955878c88d41806b63a7fa6189b003e570d6de14c0cc55dc067312843419465d3a43d3ce86ce6e583d7aa98c4f9c3484d8d", 0x9b}, {&(0x7f0000000480)="79685bf293400d4565787e1254c126fc4cb9ac6a905a9b95af6a794db247ced4e7b6e6260ce7616379598d85cbd37c35a12112177ced59821782b41ad9", 0x3d}, {&(0x7f00000004c0)="59b97eaa1ef5993e8cf9793973ce34d5e0e48f3895f547378b603822ec8f59db2b411ba792fb1e83550ab4f9c75453b3f5fd6425e7d2142c801a9c330f0dc8541ac9c4579d523b291b211515389140c4e49902ccf30d0e260124b26e13a6c3c21cb8e6ff94846b5f0b22907e45f05c15f0223ab905e981c070d57b32506cb26a859c2bc54b63a1316578e65d39afe7dad28234c1092ff11fd66aab9c8a19031a9afaa60f0000000000", 0xa9}], 0x3, 0xe) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000440)='scalable\x00', 0x9) socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 09:56:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffff5c, 0x0, 0x2}}, &(0x7f00000001c0)=""/129, 0x1a, 0x81, 0x1}, 0x20) [ 2180.094591][ T26] audit: type=1400 audit(1565344586.200:85956): avc: denied { map } for pid=31279 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2180.126404][ T26] audit: type=1400 audit(1565344586.210:85957): avc: denied { map } for pid=31311 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2180.156245][ T26] audit: type=1400 audit(1565344586.220:85958): avc: denied { map } for pid=31279 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2180.196299][ T26] audit: type=1400 audit(1565344586.220:85959): avc: denied { map } for pid=31279 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:27 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:36 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 09:56:36 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(0xffffffffffffffff, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 09:56:36 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x69, 0x8000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000140)=0x200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000280)={0x0, 0x9, 0x0, 0x0, 0x7}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x400000, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000300)=ANY=[@ANYBLOB="1b000000a541ec893f57a164165908dbc0b3ca3110f3dbdf5c6225670345dc713f3fbde63439811f47dbdf123f25b1ffbfc924bdecf293ee18100da84b27e4753e3a"]) r2 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x41, 0x80000) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000080)) 09:56:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000020000000000000001000004000000915700000001000000000000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f00000000c0)={0x3, 0x7}) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x228000) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) 09:56:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) 09:56:36 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000100000400000000000000e69a000000000004000000c114e6d5a143e41cb47fb40900d53512a1fe3934395c2aff92856ca591d38c45868cc0f25fe0534462"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) [ 2189.721998][ T26] kauditd_printk_skb: 96 callbacks suppressed [ 2189.722019][ T26] audit: type=1400 audit(1565344596.610:86056): avc: denied { map } for pid=31666 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:36 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) 09:56:36 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000b601000006000000020000000000000001000004070000000000000001000000f40d00000000"], &(0x7f00000001c0)=""/129, 0xffffffffffffffdd, 0x2, 0x1}, 0x20) r1 = dup(r0) mq_getsetattr(r1, &(0x7f0000000000)={0x1, 0x400, 0x0, 0x4, 0x2, 0x5, 0x2ed, 0x8b}, &(0x7f0000000080)) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000580)={0x4, &(0x7f0000000280)=""/201, &(0x7f0000000500)=[{0x8397, 0x7e, 0x8, &(0x7f0000000100)=""/126}, {0xffffffffffff76a4, 0x33, 0x3, &(0x7f0000000180)=""/51}, {0x100000000, 0x9a, 0x4, &(0x7f0000000380)=""/154}, {0x7f, 0x81, 0x4, &(0x7f0000000440)=""/129}]}) [ 2189.896207][ T26] audit: type=1400 audit(1565344596.640:86057): avc: denied { map } for pid=31666 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) [ 2190.041054][ T26] audit: type=1400 audit(1565344596.640:86058): avc: denied { map } for pid=31666 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800005a000000000010000001000004000000000000000001000000000000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2190.165407][ T26] audit: type=1400 audit(1565344596.650:86059): avc: denied { map } for pid=31666 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2190.298626][ T26] audit: type=1400 audit(1565344596.650:86060): avc: denied { map } for pid=31666 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2190.383832][ T26] audit: type=1400 audit(1565344596.680:86061): avc: denied { map } for pid=31666 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2190.411160][ T26] audit: type=1400 audit(1565344596.690:86062): avc: denied { map } for pid=31666 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2190.518042][ T26] audit: type=1400 audit(1565344596.700:86063): avc: denied { map } for pid=31666 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2190.578256][ T26] audit: type=1400 audit(1565344596.880:86064): avc: denied { map } for pid=31773 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2190.601642][ T26] audit: type=1400 audit(1565344596.880:86065): avc: denied { map } for pid=31773 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:46 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 09:56:46 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) 09:56:46 executing program 3: removexattr(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=@known='trusted.overlay.opaque\x00') mount(&(0x7f0000000080)=ANY=[@ANYBLOB='/eev/loop0\x00'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x100000, &(0x7f0000000180)='vboxnet1/keyring\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x100, 0x30) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) close(r1) bind$vsock_dgram(r0, &(0x7f0000000640)={0x28, 0x0, 0x0, @hyper}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001800000015000c00020000000000000001000004000000000000000001000000f40d00000000"], &(0x7f00000001c0)=""/129, 0xfffffe12, 0x81, 0x1}, 0x20) listxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/227, 0xe3) getsockopt$inet_dccp_buf(r0, 0x21, 0x8f, &(0x7f00000002c0)=""/171, &(0x7f0000000380)=0xab) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000500)=0x3, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x0, 0x10}, 0x10) 09:56:46 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002e4586c64418e4c6de00000000000000001000004000000000000000001"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:46 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) 09:56:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000200000000000000010000040000000000000000010000000000000000000644c8f4e41cfcd41c30d39e8a95d69769905588e1fed8892bb1549dc9e75a38e6389705ca93b926d429f17ba542e631eecda461a264eb26a353d995ccb082e2e2d99ed8f48985ffb657367b13028e6aae63110b2ab717af1b6ec2495e3b0d0155728b0403047deb41d8b2f1717027795a85b1d9298ac6a6437270a81626b71fbb5a2cfdd9986d69117146ad3a8f4eb1d99ba2949ec948d6acaf05f257f66a4f0d9b6b7e0fb46174042133"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:46 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000080)={0xc221eb1f4142964d, 0x0, [0x80, 0x10000, 0x100000000, 0x6]}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000140)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2199.991702][ T26] kauditd_printk_skb: 34 callbacks suppressed [ 2199.991716][ T26] audit: type=1400 audit(1565344606.880:86100): avc: denied { map } for pid=31940 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2200.101725][ T26] audit: type=1400 audit(1565344606.910:86101): avc: denied { map } for pid=31940 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:47 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:47 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000480)='/dev/cachefiles\x00', 0x400000000098080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000180)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x4b, 0x6, 0x100000001, 0x1, r0, 0x3ff, [], r1, 0xffffffffffffffff, 0x3, 0x1}, 0x3c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000000001000004000000000000000001000000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2200.271013][ T26] audit: type=1400 audit(1565344606.930:86102): avc: denied { map } for pid=31940 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2200.408206][ T26] audit: type=1400 audit(1565344606.930:86103): avc: denied { map } for pid=31940 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2200.467959][ T26] audit: type=1400 audit(1565344606.940:86104): avc: denied { map } for pid=31940 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2200.552469][ T26] audit: type=1400 audit(1565344606.960:86105): avc: denied { map } for pid=31940 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2200.616716][ T26] audit: type=1400 audit(1565344606.970:86106): avc: denied { map } for pid=31940 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2200.649800][ T26] audit: type=1400 audit(1565344606.980:86107): avc: denied { map } for pid=32008 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2200.676635][ T26] audit: type=1400 audit(1565344606.980:86108): avc: denied { map } for pid=32008 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2200.705229][ T26] audit: type=1400 audit(1565344606.990:86109): avc: denied { map } for pid=32008 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 09:56:56 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) 09:56:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000100000400000000007d5608746d44f6b6c7c11500000001000000f40d00000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:56 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000200000000000000010000040000000000000000010000000000000000004b4dee8c7da0f5ef"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:56 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:56:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) 09:56:57 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) 09:56:57 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@tipc, &(0x7f0000000080)=0x80, 0x800) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0)=@ccm_128={{0x307}, "d53a3926720f6c8a", "bf8acd8fc4e8cb78362d4ce6262afc8a", "8e2025c1", "69f09f3e070303b4"}, 0x28) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000001c0)=0x10, 0x4) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000140)=""/95) [ 2210.198209][ T26] kauditd_printk_skb: 44 callbacks suppressed [ 2210.198223][ T26] audit: type=1400 audit(1565344617.090:86154): avc: denied { map } for pid=32144 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:57 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) [ 2210.312913][ T26] audit: type=1400 audit(1565344617.130:86155): avc: denied { map } for pid=32144 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2210.446010][ T26] audit: type=1400 audit(1565344617.130:86156): avc: denied { map } for pid=32144 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2210.484128][ T26] audit: type=1400 audit(1565344617.130:86157): avc: denied { map } for pid=32144 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:57 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) [ 2210.580087][ T26] audit: type=1400 audit(1565344617.140:86158): avc: denied { map } for pid=32144 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 09:56:57 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000040)=""/144, &(0x7f0000000140)=0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x17, 0xfffffffffffffec3, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:57 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r1 = dup2(r0, r0) write$P9_RFSYNC(r1, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) [ 2210.749946][ T26] audit: type=1400 audit(1565344617.140:86159): avc: denied { map } for pid=32144 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:57 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) [ 2210.906122][ T26] audit: type=1400 audit(1565344617.140:86160): avc: denied { map } for pid=32144 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:57 executing program 5: syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) [ 2211.124249][ T26] audit: type=1400 audit(1565344617.150:86161): avc: denied { map } for pid=32144 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:58 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) [ 2211.289412][ T26] audit: type=1400 audit(1565344617.330:86162): avc: denied { map } for pid=32150 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:56:58 executing program 3: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2211.386612][T32373] audit: audit_backlog=65 > audit_backlog_limit=64 09:56:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0x9db3ff6336c4215d, 0x2) set_thread_area(&(0x7f00000001c0)={0x7, 0x0, 0xf5d34d3b7ec8f6a4, 0x0, 0x7, 0x0, 0x0, 0x401, 0x8, 0xfffffffffffffffc}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000100)={0xfffffffffffffffc, 0x2d, 0x1, 0x7f, 0xffff, 0x7}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000100000400"/50], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:56:58 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:58 executing program 5: syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) 09:56:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[], &(0x7f00000001c0)=""/129, 0x0, 0xfffffffffffffee4, 0x1}, 0x20) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000003bc0)='/dev/autofs\x00', 0x400000, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000080)={0x2, 0x5}, 0x2) setitimer(0x0, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, &(0x7f0000000100)) getsockopt$inet6_dccp_int(r0, 0x21, 0xd, &(0x7f0000003c00), &(0x7f0000003c40)=0x4) 09:56:58 executing program 5: syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0) 09:56:58 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:56:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb2f010018000000000000001800000018000000020000000000000001000004000000000000000001000000f40d000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x2) socket$xdp(0x2c, 0x3, 0x0) 09:56:59 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010000000002000000000000283000000400000000000000000100000000000000000057205ab7f074c94dbd94d43e06000000000000007faaca03e63400020000000000000000ff0000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x8, &(0x7f0000001680)=[{&(0x7f0000000280)="382d6bb4a952e9bf306765c5f3428f3aa5fb9c81e39442e4600bfa5252ace528d8dad1b78ae845e43064fb3b9dd8fb07db23d64cf6d04ca4e3b41c08f2efe4abf92b5ef5f23fa8f672617717275964a4ea412dd05f4c671c75a6d8f64c92dc3af5b058e70b52ff09316d7e85334eadb6bb7cb9d286a74c5da8a58274c97423e9072d5cc2bc08607a3fc9db236ea07c5a8291a90c3f5e06acb054bcc3db3fababd7d12cd5a765576b3f954deca237feb34b77d8b5b7c66862c210fa05283fbbd02999baed9b6715e4c10a68241681312020757e91000e", 0xd6, 0x6}, {&(0x7f0000000380)="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", 0xfb, 0x5}, {&(0x7f00000017c0)="584b1dff7b23a89cca6480e6be1f6510abe03136d72a477fdbb96752b1375bc246ff5dc2433b5d7443d70b1cc9302a0057562e15cf0a8c3544bfa94c493cd01cdd5735a69dcc097500a484b1dce235aa9b94e1717758f1732f7ee4bb710ffac38e189ffd873b03847d4323bcf0a46a607554a3707b127c8ad785f3fb23e2de70a2e21094a7f688493dfde0235b98417d946ca458183498e9776ee86149b379b09f3a132b683268e158bab5ed9573d8f9656788d1d3b2988a8f55c493", 0x68, 0xde1}, {&(0x7f0000000480)="59be72fcea440ac003c97883745a994b9d46812dab40cdd837687065cd0c4ed2fbef2fcd2a77c1e04833f0f8da64ab8a13d00c039da9c14c6bdcf6ac99602c568b61e0d56c19177e1aa687d3d371056999c75cc4638e7d60200fdd80ea610273b21e4dc4ef3671a16a2c7bb901f6a45b837c5d092e7755c1bf35d532275353cb2a16ebbae560a66dba7112959a20b373f40f4881d8e336a3a8b0f13fcebdeae9f42a3fda2a544d1e2143c1feca11e87d0d", 0x46a, 0x4}, {&(0x7f0000001740)="0653f4e8350f0dbdd813790aa4c03753d2114509ebfa2af1101cb1361f71f74f27c763ca6df03d52d5cfa7ab7648345ad19dacfcef0041b8010f15164113e5f8fdf833e0dc7b68280efa745c30b4d06f7d7ae2e6a17feb36829877aebf16923b370ab4e73340c6b00000000000000000", 0x70, 0x1b}, {&(0x7f00000005c0)="e0429e007513bc027838b98e78eb58f1340555eea5bd6ad5e5eff7c04e49d3ea854efb67c58aa141e6e20b33f1a396427589dd61d45f20de434daf29c1c070bfeb06e026c584523fb621b78cb238bddc9ed4229a16e7f61b93d32e835a0867b62f3660eeaf5e44019e60d8a1d85c85dd79c9df8dd88c2e59cf37ae57014238d76db259d525e6824e48697dad753b7dcfc5354c60d6f36e12eace918084", 0x9d, 0x912}, {&(0x7f00000000c0)="9df2897cb53192777d8a941b2df93e84d2c61fc733c53c5a5251ea4f4841adb44090bc110d9ab806063f82fb21a1baa90ab346", 0x33, 0x80}, {&(0x7f0000000680)="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", 0x1000}], 0x10, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/audio\x00', 0x100ffd, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000001880)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e20, 0x4, @rand_addr="95c1ceaaa71f397a6e20e7944c724201", 0xffffffffffffffff}, @in6={0xa, 0x4e21, 0x8, @rand_addr="a82d8723405582e42ada8e8faa143746", 0x9}, @in6={0xa, 0x4e24, 0x6, @local, 0x4e21}, @in6={0xa, 0x4e21, 0x1, @mcast2, 0x900}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e24, 0x4, @local, 0xfffffffffffffffe}, @in6={0xa, 0x4e20, 0x7, @mcast1, 0x5}, @in6={0xa, 0x4e23, 0x3, @ipv4={[], [], @multicast1}, 0x8c}], 0xf4) ioctl$void(r0, 0xc0045c79) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x3, 0x0) ioctl(r1, 0x3f, &(0x7f0000001cc0)="0791c16dc1d574a42d4673299d7163b382fc9f954931896120d974b79499b162b2235bd5f02cbd0adc2098ef084e998f034e1404ea259778fbe7190d835e4aa24194d35349157733a13c72ce62dcd62c78804d0f373d48fb2eb416315e28abb5665095428d4fac678381a6dc17597567b9952736b72d6626d3bcc94da2d0442b5196b2718ac39ad0601bddae43e7cfd85f98cc24ffe2670d8d8df78c7b0c540f5035461ec5eac5d50e00e5f3e9f6502c17f383f3f2009a9b6b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001bc0)={'filter\x00', 0x4}, 0x68) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b40)={r1, 0xc0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x9, 0x0, 0x0, 0x0, &(0x7f0000001980)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000019c0)={0x3, 0x1, 0x9, 0x8000}, &(0x7f0000001a00)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)=0x2}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b80)=r2, 0x4) 09:56:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(0xffffffffffffffff, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 09:56:59 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, 0x0, 0x0, 0x0) [ 2212.413957][T32490] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 09:57:09 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 09:57:09 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[]]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xffffffffffffffd2}}, &(0x7f00000001c0)=""/129, 0x32, 0x81}, 0x20) 09:57:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0xffffffffffffffca, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}, {0x0, [0x61, 0x7f, 0x0]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:57:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(0xffffffffffffffff, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 09:57:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, 0x0, 0x0, 0x0) 09:57:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0xfffffffffffffe64) 09:57:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, 0x0, 0x0, 0x0) 09:57:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000400000000000000f800"/44], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2222.343590][ T26] kauditd_printk_skb: 178 callbacks suppressed [ 2222.343605][ T26] audit: type=1400 audit(1565344629.230:86330): avc: denied { map } for pid=32550 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:09 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) [ 2222.527201][ T26] audit: type=1400 audit(1565344629.270:86331): avc: denied { map } for pid=32550 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, &(0x7f0000000040), 0x0, 0x0) 09:57:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) [ 2222.658440][ T26] audit: type=1400 audit(1565344629.320:86332): avc: denied { map } for pid=32550 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:09 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[]]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:09 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 09:57:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000140)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000280)={r1, r2, 0x3}) r3 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) setsockopt$inet6_int(r3, 0x29, 0xda, &(0x7f0000000080), 0x4) [ 2222.805356][ T26] audit: type=1400 audit(1565344629.330:86333): avc: denied { map } for pid=32550 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, &(0x7f0000000040), 0x0, 0x0) [ 2222.995432][ T26] audit: type=1400 audit(1565344629.330:86334): avc: denied { map } for pid=32550 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0x1) 09:57:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(0xffffffffffffffff, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 09:57:10 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) [ 2223.178712][ T26] audit: type=1400 audit(1565344629.340:86335): avc: denied { map } for pid=32550 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2223.338403][ T26] audit: type=1400 audit(1565344629.340:86336): avc: denied { map } for pid=32550 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=""/129, 0x32, 0x35, 0x1}, 0x20) 09:57:10 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) 09:57:10 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[]]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2223.438547][ T26] audit: type=1400 audit(1565344629.350:86337): avc: denied { map } for pid=32550 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2223.598176][ T26] audit: type=1400 audit(1565344629.400:86338): avc: denied { map } for pid=32596 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:10 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) [ 2223.644647][ T559] audit: audit_backlog=66 > audit_backlog_limit=64 09:57:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f00000001c0)=""/129, 0x20, 0x81, 0x1}, 0x20) 09:57:10 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, &(0x7f0000000040), 0x0, 0x0) 09:57:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000040)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:57:10 executing program 3: r0 = dup(0xffffffffffffffff) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000140)={0x2}, 0xffffffd2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0x9000001a}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xfffffffffffffdcd, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xdf4}]}]}}, &(0x7f0000000040)=""/129, 0x32, 0x81, 0x5}, 0x20) 09:57:11 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 09:57:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) 09:57:11 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:11 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'syzkaller1\x00', 0x200}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000080000000000000001000004000000000000000001000000001d0000007f6f0000006100"], &(0x7f00000001c0)=""/129, 0x38, 0x81, 0x1}, 0x20) r2 = dup2(r0, r0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') r4 = syz_open_dev$radio(&(0x7f00000003c0)='/dev/radio#\x00', 0x1, 0x2) r5 = syz_open_dev$adsp(&(0x7f0000000400)='/dev/adsp#\x00', 0xfffffffffffffffb, 0x20802) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x9c, r3, 0x80d, 0x0, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r4}, {0x8, 0x1, r1}, {0x8, 0x1, r5}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x4800) r6 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0xffffffffffffffbc, 0x200) ioctl$KVM_SET_TSC_KHZ(r6, 0xaea2, 0x1) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000580)={0x0, 0x2, 0x100000000, 0x8, 0xa32, 0xfffffffffffffffb, 0x8, 0x7f, {0x0, @in={{0x2, 0x4e21, @empty}}, 0x74, 0x1ff, 0x8, 0xe9, 0x60}}, &(0x7f0000000640)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f00000000c0)={r7, 0x1000000001}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000280)={r8, @in={{0x2, 0x4e21, @broadcast}}, 0x3, 0x3f, 0xd5bd, 0x1, 0x1}, &(0x7f0000000180)=0x98) 09:57:11 executing program 1: openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 09:57:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x19, 0xfdd3, 0x2, [@datasec={0xc, 0x1, 0x0, 0xf, 0x1, [{0x2, 0x6, 0x4f}], "e1"}]}, {0x0, [0x3e, 0x0, 0x61, 0x0, 0x7f]}}, &(0x7f00000001c0)=""/129, 0x107, 0x81, 0x1}, 0x20) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000280)=""/4096) write$selinux_context(r0, &(0x7f0000000000)='system_u:object_r:pam_exec_t:s0\x00', 0x20) 09:57:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) 09:57:11 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:11 executing program 1: openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 09:57:12 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) prctl$PR_CAPBSET_DROP(0x18, 0x5) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x98, r1, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x200}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}]}]}, 0x98}}, 0xfcd5057e870a7a4f) 09:57:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/rt_acct\x00') preadv(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) 09:57:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x101}}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x4e, 0x1}, 0x20) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x40, 0x0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000280)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) 09:57:12 executing program 1: openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 09:57:12 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:12 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xffffffc6) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x80) splice(r0, 0x0, r2, 0x0, 0x103fffffd, 0xd) 09:57:12 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1) write$vhci(r0, 0x0, 0x0) 09:57:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ubi_ctrl\x00', 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) 09:57:13 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:13 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1) write$vhci(r0, 0x0, 0x0) 09:57:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@getqdisc={0x24, 0x26, 0x30b}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007940)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000440)=""/189, 0xbd}, {&(0x7f0000000080)=""/61, 0x3d}, {&(0x7f0000000540)=""/167, 0xa7}, {&(0x7f0000000600)=""/228, 0xe4}, {&(0x7f0000000700)=""/246, 0xf6}, {&(0x7f0000000800)=""/32, 0x20}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/24, 0x18}, {&(0x7f0000002240)=""/4096, 0x1000}], 0x9}}], 0x1, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=@getqdisc={0x24, 0x26, 0x317}, 0x24}}, 0x0) 09:57:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) 09:57:13 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @null, @netrom, @rose, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") close(r0) 09:57:13 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:13 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1) write$vhci(r0, 0x0, 0x0) 09:57:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:13 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a290930206030200000001020009003900090035000c03110000001900144023dc0b00000022dc1338d54400009b84136ef75afb83de4411000500c43a0900000000000000ab91d4", 0x55}], 0x1, 0x0, 0x0, 0x6}, 0x0) 09:57:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x40) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x10}, 0x1c) sendto$inet6(r1, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x1982) 09:57:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000020000000000000800000004000000000000000001000000000000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000080)={0x1000, 0x1}) 09:57:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a290930206030200000001020009003900090035000c021100000019000b4023dc0b00000022dc1338d54400009b84136ef75afb83de4411000500c43a0900000000000000ab91d4", 0x55}], 0x1, 0x0, 0x0, 0x6}, 0x0) [ 2227.397875][ T26] kauditd_printk_skb: 357 callbacks suppressed [ 2227.397888][ T26] audit: type=1400 audit(1565344634.290:86688): avc: denied { map } for pid=1581 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@getqdisc={0x24, 0x26, 0x30b}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000007940)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000440)=""/189, 0xbd}, {&(0x7f0000000080)=""/61, 0x3d}, {&(0x7f0000000540)=""/167, 0xa7}, {&(0x7f0000000600)=""/228, 0xe4}, {&(0x7f0000000700)=""/246, 0xf6}, {&(0x7f0000000800)=""/32, 0x20}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/24, 0x18}, {&(0x7f0000002240)=""/4096, 0x1000}], 0x9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=@getqdisc={0x24, 0x26, 0x317}, 0x24}}, 0x0) 09:57:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x100000001, 0x8000) eventfd2(0x400, 0x800) getsockopt$inet6_dccp_buf(r0, 0x21, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000080)=0x1000) [ 2227.591087][ T26] audit: type=1400 audit(1565344634.340:86689): avc: denied { map } for pid=1581 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/70, 0x46}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xcc, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x11, &(0x7f0000000000), 0x4) recvfrom$inet(r1, 0x0, 0xff4c, 0x80002, 0x0, 0x800e0054e) shutdown(r1, 0x0) 09:57:14 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2227.672528][ T26] audit: type=1400 audit(1565344634.350:86690): avc: denied { map } for pid=1581 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:14 executing program 3: poll(&(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x800000000004b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x58d, 0x0, 0x0, 0x800e006e9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x55c, 0x2, 0x0, 0x800e004e1) shutdown(r0, 0x0) shutdown(r1, 0x0) [ 2227.750046][ T26] audit: type=1400 audit(1565344634.350:86691): avc: denied { map } for pid=1581 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0xfffffffffffffffd, 0x101000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@rand_addr, @remote, 0x0}, &(0x7f0000000080)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@mcast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0xfffffffffffffffd, 0x4e22, 0xb44e, 0xa, 0x80, 0x20, 0xef, r1, r2}, {0x2, 0x2, 0xfffffffffffffff8, 0x401, 0x0, 0xc546, 0x20}, {0x8, 0x8, 0x7a, 0x4000}, 0xffff, 0x6e6bb6, 0x1, 0x1}, {{@in=@rand_addr=0x7, 0x4d4, 0xff}, 0xa, @in=@remote, 0x3500, 0x0, 0x2, 0x80000000, 0x100000001, 0x80, 0xffffffff00000001}}, 0xe8) 09:57:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/70, 0x46}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xcc, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x11, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xff4c, 0x80002, 0x0, 0x800e0054e) shutdown(r1, 0x0) [ 2227.894844][ T26] audit: type=1400 audit(1565344634.350:86692): avc: denied { map } for pid=1581 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, 0x0, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:14 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@datasec={0x8, 0x0, 0x0, 0xf, 0x0, [{0x1, 0x7fffffff, 0xffff}, {0x4, 0x4, 0x3}, {0x3, 0x22c4, 0x400}], "e0"}]}}, &(0x7f00000001c0)=""/129, 0x105, 0x81, 0x1}, 0x20) 09:57:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/70, 0x46}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xcc, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) poll(0x0, 0x0, 0x4e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xcfb3abb5, 0x0, 0x0, 0x800e00dce) poll(&(0x7f00000000c0)=[{}, {}], 0x2, 0x1fb) shutdown(r1, 0x0) [ 2228.137595][ T26] audit: type=1400 audit(1565344634.350:86693): avc: denied { map } for pid=1581 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2228.361739][ T26] audit: type=1400 audit(1565344634.370:86694): avc: denied { map } for pid=1630 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:15 executing program 3: poll(&(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x800000000004b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x58d, 0x0, 0x0, 0x800e006e9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x55c, 0x2, 0x0, 0x800e004e1) shutdown(r0, 0x0) shutdown(r1, 0x0) 09:57:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, 0x0, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) [ 2228.556589][ T26] audit: type=1400 audit(1565344634.370:86695): avc: denied { map } for pid=1630 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:15 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x20000) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x4e20, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) [ 2228.682462][ T26] audit: type=1400 audit(1565344634.720:86696): avc: denied { map } for pid=1851 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) read(r0, &(0x7f0000000000)=""/117, 0x75) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xc8f4, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f00000000c0)={0x10000}, 0x10) r2 = dup2(r1, r0) getsockopt$inet6_buf(r2, 0x29, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xffffff51, 0x42, 0x0, 0x800e00511) shutdown(r0, 0x0) [ 2228.853460][ T2268] audit: audit_backlog=65 > audit_backlog_limit=64 09:57:15 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b6"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, 0x0, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:16 executing program 3: 09:57:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xd4, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:57:16 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b6"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2229.328779][ T2112] cgroup: fork rejected by pids controller in /syz1 09:57:16 executing program 3: 09:57:16 executing program 1: 09:57:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002b10000000000000100000400000000000000007b27ffff000000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:57:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000), &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:16 executing program 5: 09:57:16 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = eventfd2(0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 09:57:16 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b6"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:16 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 09:57:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000002c0)=""/173, 0xad}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f0000000000)={0x3}, 0x10) fchmod(r1, 0x0) recvfrom$inet(r1, 0x0, 0xd172, 0x0, 0x0, 0x800e0050e) shutdown(r1, 0x0) 09:57:16 executing program 0: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1}]}]}}, &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) prctl$PR_SET_DUMPABLE(0x4, 0x1) 09:57:17 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000000000000000000000100000400"/50], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000080)=[{0xfffffffffffffffe, 0x6, 0x3, 0xa9}, {0x7fffffff, 0xffffffffffffff1d, 0xa23, 0x3b}]}) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x553800) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) 09:57:17 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000002c0)=""/173, 0xad}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f0000000000)={0x3}, 0x10) fchmod(r1, 0x0) recvfrom$inet(r1, 0x0, 0xd172, 0x2, 0x0, 0x800e0050e) shutdown(r1, 0x0) 09:57:17 executing program 3: 09:57:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000), &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000040000001800000018000000028bfa360d2c219cdf129ced66210000000000000001000004000000000000000001000000000000000000"], &(0x7f00000001c0)=""/129, 0x32, 0x81, 0x1}, 0x20) 09:57:19 executing program 1: 09:57:19 executing program 3: 09:57:19 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:19 executing program 5: 09:57:19 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:57:19 executing program 5: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) perf_event_open$cgroup(0x0, r3, 0x1, 0xffffffffffffffff, 0x3) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x5, 0x401, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800, 0x0, 0x1f, 0xffff, 0x10001, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x0, 0x2734c79b, 0x9, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x9, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth0\x00'}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r4 = openat$cgroup_ro(r1, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0xef42, 0x400, 0x0, 0x0, 0x9, 0x6, 0x5fd1, 0x0, 0x1000, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x7, 0xffffffffffff3bcf, 0x0, 0x9, 0x3, 0x10001, 0x410e, 0x7ff, 0x7000000000, 0x0, 0x7fff, 0x0, 0x401, 0x8, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000005c0)}, 0x0, 0x8, 0x9, 0x3, 0xfffffffffffffff9, 0x2, 0x400}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) write$cgroup_int(r4, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) 09:57:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 09:57:19 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2232.865279][ T26] kauditd_printk_skb: 224 callbacks suppressed [ 2232.865292][ T26] audit: type=1400 audit(1565344639.750:86919): avc: denied { map } for pid=2986 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.877860][ T26] audit: type=1400 audit(1565344639.770:86920): avc: denied { map } for pid=2986 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) [ 2233.112580][ T26] audit: type=1400 audit(1565344639.770:86921): avc: denied { map } for pid=2986 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2233.253936][ T26] audit: type=1400 audit(1565344639.790:86922): avc: denied { map } for pid=2992 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2233.432370][ T26] audit: type=1400 audit(1565344639.810:86923): avc: denied { map } for pid=2992 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2233.511504][ T26] audit: type=1400 audit(1565344639.840:86924): avc: denied { map } for pid=2992 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2233.541324][ T26] audit: type=1400 audit(1565344639.840:86925): avc: denied { map } for pid=2992 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2233.570009][ T26] audit: type=1400 audit(1565344639.860:86926): avc: denied { map } for pid=2992 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2233.599028][ T26] audit: type=1400 audit(1565344640.060:86927): avc: denied { map } for pid=3034 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2233.647838][ T26] audit: type=1400 audit(1565344640.070:86928): avc: denied { map } for pid=3034 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000), &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:22 executing program 1: perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x200000000000, 0x0, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 09:57:22 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:22 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007126000000000000bf67000000000000570600000fff07006707000002000000070600000ee60000bf050000000000000f650000000000006507f4ff02000000070700004c0000001f75000000000000bf54000000000000070500000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 09:57:22 executing program 0: setreuid(0x0, 0xee00) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 09:57:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') preadv(r0, &(0x7f0000000600)=[{&(0x7f0000000040)=""/239, 0xef}], 0x1, 0x0) 09:57:22 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) write$cgroup_int(r1, &(0x7f0000000040)=0x200, 0x12) 09:57:22 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:23 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46dd"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:23 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000800)="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", 0xeed) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0xc) write(r3, &(0x7f0000000600)="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", 0x1b7) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000140)) sendfile(r3, r4, 0x0, 0x10000) 09:57:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) write$cgroup_int(r1, &(0x7f0000000040)=0x200, 0x12) 09:57:25 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:25 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46dd"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007126000000000000bf67000000000000570600000fff07006707000002000000070600000ee60000bf050000000000000f650000000000006507f4ff02000000070700004c0000001f75000000000000bf54000000000000070500000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 09:57:25 executing program 0: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f00000001c0)=@v2={0x3, 0x0, 0x0, 0x0, 0x1c, "d7002dc7fbfe0f89666a208b2ad9e513437161e6a6abea8a20abd396"}, 0x26, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000180)='./file1\x00', r0, &(0x7f00000007c0)='./file2\x00') [ 2239.005098][ T26] kauditd_printk_skb: 136 callbacks suppressed [ 2239.005112][ T26] audit: type=1400 audit(1565344645.890:87065): avc: denied { prog_load } for pid=3436 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 09:57:26 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46dd"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2239.076396][ T3443] overlayfs: lowerdir is in-use as upperdir/workdir 09:57:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) write$cgroup_int(r1, &(0x7f0000000040)=0x200, 0x12) [ 2239.161312][ T26] audit: type=1400 audit(1565344645.930:87066): avc: denied { map } for pid=3444 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2239.192591][ T3443] overlayfs: lowerdir is in-use as upperdir/workdir 09:57:26 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000b82000)) ppoll(&(0x7f00000038c0)=[{r0, 0x4}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 2239.292573][ T26] audit: type=1400 audit(1565344645.940:87067): avc: denied { map } for pid=3444 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2239.430869][ T26] audit: type=1400 audit(1565344645.950:87068): avc: denied { map } for pid=3444 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:26 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) write$cgroup_int(r1, &(0x7f0000000040)=0x200, 0x12) [ 2239.625923][ T26] audit: type=1400 audit(1565344645.950:87069): avc: denied { map } for pid=3444 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2239.743530][ T26] audit: type=1400 audit(1565344645.950:87070): avc: denied { map } for pid=3444 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2239.864619][ T26] audit: type=1400 audit(1565344645.960:87071): avc: denied { map } for pid=3444 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2240.021630][ T26] audit: type=1400 audit(1565344645.980:87072): avc: denied { map } for pid=3444 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2240.052330][ T26] audit: type=1400 audit(1565344646.200:87073): avc: denied { map } for pid=3449 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2240.092581][ T26] audit: type=1400 audit(1565344646.200:87074): avc: denied { map } for pid=3449 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:28 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) 09:57:28 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007126000000000000bf67000000000000570600000fff07006707000002000000070600000ee60000bf050000000000000f650000000000006507f4ff02000000070700004c0000001f75000000000000bf54000000000000070500000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 09:57:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000b82000)) ppoll(&(0x7f00000038c0)=[{r0, 0x4}, {r1}], 0x2, 0x0, 0x0, 0x0) 09:57:29 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:29 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) 09:57:29 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000b82000)) ppoll(&(0x7f00000038c0)=[{r0, 0x4}, {r1}], 0x2, 0x0, 0x0, 0x0) 09:57:29 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) 09:57:29 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:29 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR, @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:32 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:32 executing program 5: 09:57:32 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) 09:57:32 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR, @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000b82000)) ppoll(&(0x7f00000038c0)=[{r0, 0x4}, {r1}], 0x2, 0x0, 0x0, 0x0) 09:57:32 executing program 5: 09:57:32 executing program 1: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0x12) 09:57:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ppoll(&(0x7f00000038c0)=[{r0, 0x4}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 2245.269355][ T26] kauditd_printk_skb: 118 callbacks suppressed [ 2245.269367][ T26] audit: type=1400 audit(1565344652.160:87193): avc: denied { map } for pid=3525 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:32 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:32 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR, @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2245.441391][ T26] audit: type=1400 audit(1565344652.200:87194): avc: denied { map } for pid=3525 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:32 executing program 5: 09:57:32 executing program 1: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0x12) [ 2245.589945][ T26] audit: type=1400 audit(1565344652.200:87195): avc: denied { map } for pid=3525 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2245.765279][ T26] audit: type=1400 audit(1565344652.210:87196): avc: denied { map } for pid=3525 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2245.921878][ T26] audit: type=1400 audit(1565344652.210:87197): avc: denied { map } for pid=3525 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2246.079461][ T26] audit: type=1400 audit(1565344652.210:87198): avc: denied { map } for pid=3525 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2246.145078][ T26] audit: type=1400 audit(1565344652.310:87199): avc: denied { map } for pid=3529 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2246.205191][ T26] audit: type=1400 audit(1565344652.310:87200): avc: denied { map } for pid=3529 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2246.240489][ T26] audit: type=1400 audit(1565344652.310:87201): avc: denied { map } for pid=3529 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2246.265367][ T26] audit: type=1400 audit(1565344652.310:87202): avc: denied { map } for pid=3529 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:35 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:35 executing program 1: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0x12) 09:57:35 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:35 executing program 5: 09:57:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) ppoll(&(0x7f00000038c0)=[{r0, 0x4}, {r1}], 0x2, 0x0, 0x0, 0x0) 09:57:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) 09:57:35 executing program 5: 09:57:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000038c0)=[{r0, 0x4}, {}], 0x2, 0x0, 0x0, 0x0) 09:57:35 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:35 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) 09:57:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:35 executing program 5: 09:57:35 executing program 0: ppoll(&(0x7f00000038c0)=[{0xffffffffffffffff, 0x4}, {}], 0x2, 0x0, 0x0, 0x0) 09:57:36 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) 09:57:36 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:36 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0xbad}, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x16) 09:57:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:36 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:36 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0x12) 09:57:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:37 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB, @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:37 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:37 executing program 0: ppoll(&(0x7f00000038c0)=[{0xffffffffffffffff, 0x4}, {}], 0x2, 0x0, 0x0, 0x0) 09:57:37 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0x12) [ 2250.338080][ T26] kauditd_printk_skb: 184 callbacks suppressed [ 2250.338092][ T26] audit: type=1400 audit(1565344657.230:87387): avc: denied { map } for pid=4003 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2250.523727][ T26] audit: type=1400 audit(1565344657.230:87388): avc: denied { map } for pid=4003 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) [ 2250.687012][ T26] audit: type=1400 audit(1565344657.230:87389): avc: denied { map } for pid=4003 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:37 executing program 5: shutdown(0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000001580)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000040)=""/29) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000640)={0x0, {}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e21, @multicast2}, 0x15, 0x0, 0x0, 0x0, 0xec4, &(0x7f00000001c0)='netdevsim0\x00', 0xffffffff}) socketpair(0xb, 0x3, 0xffffffffffff8000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x38200, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000100)=0xffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000940)=[{&(0x7f0000002f00)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x4000000) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000440)={@mcast2, 0x0}, &(0x7f0000000480)=0x14) connect$packet(r1, &(0x7f00000004c0)={0x11, 0x1e, r3, 0x1, 0xfffffffffffffffc, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2@\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1eu\xa1T\xd7d\x9a`=^h\x8c8\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\xd5\x16\xde\xa09\xe2\xaa\x90\x958\xd6\xe6', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x0) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000300)=0x94, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) 09:57:37 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0x12) [ 2250.812575][ T26] audit: type=1400 audit(1565344657.230:87390): avc: denied { map } for pid=4003 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:37 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB, @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:37 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) [ 2250.893740][ T26] audit: type=1400 audit(1565344657.310:87391): avc: denied { map } for pid=4003 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) 09:57:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) [ 2251.044263][ T26] audit: type=1400 audit(1565344657.310:87392): avc: denied { map } for pid=4003 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2251.146225][ T26] audit: type=1400 audit(1565344657.360:87393): avc: denied { map } for pid=4003 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:38 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB, @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) [ 2251.304226][ T26] audit: type=1400 audit(1565344657.370:87394): avc: denied { map } for pid=4003 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:38 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) [ 2251.434832][ T26] audit: type=1400 audit(1565344657.450:87395): avc: denied { map } for pid=4033 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:38 executing program 0: ppoll(&(0x7f00000038c0)=[{0xffffffffffffffff, 0x4}, {}], 0x2, 0x0, 0x0, 0x0) 09:57:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000300)={0x400000007b, 0x5, [0x17b, 0x0, 0x49], [0xc1]}) [ 2251.652133][ T26] audit: type=1400 audit(1565344657.450:87396): avc: denied { map } for pid=4033 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:38 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:38 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB='\x00'/12, @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) 09:57:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) 09:57:39 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB='\x00'/12, @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/packet\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x79) 09:57:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:39 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:39 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000038c0)=[{r0, 0x4}, {}], 0x2, 0x0, 0x0, 0x0) 09:57:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) 09:57:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:39 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB='\x00'/12, @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) 09:57:40 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:40 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xc, &(0x7f0000000140)=""/18) 09:57:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 09:57:40 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:40 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:40 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000038c0)=[{r0, 0x4}, {}], 0x2, 0x0, 0x0, 0x0) 09:57:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, 0x0, 0x0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 09:57:40 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:41 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 09:57:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, 0x0, 0x0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:41 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:41 executing program 1: 09:57:41 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:41 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000038c0)=[{r0, 0x4}, {}], 0x2, 0x0, 0x0, 0x0) 09:57:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, 0x0, 0x0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:41 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:41 executing program 1: 09:57:42 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0), 0x0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) [ 2255.354712][ T26] kauditd_printk_skb: 348 callbacks suppressed [ 2255.354727][ T26] audit: type=1400 audit(1565344662.240:87715): avc: denied { map } for pid=4946 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:42 executing program 1: 09:57:42 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2255.549600][ T26] audit: type=1400 audit(1565344662.250:87716): avc: denied { map } for pid=4946 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2255.817733][ T26] audit: type=1400 audit(1565344662.280:87717): avc: denied { map } for pid=4943 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2255.992950][ T26] audit: type=1400 audit(1565344662.280:87718): avc: denied { map } for pid=4943 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:43 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:43 executing program 1: [ 2256.162184][ T26] audit: type=1400 audit(1565344662.300:87719): avc: denied { map } for pid=4949 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2256.253282][ T5066] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2256.289976][ T5066] audit: audit_lost=1911 audit_rate_limit=0 audit_backlog_limit=64 [ 2256.320021][ T26] audit: type=1400 audit(1565344662.300:87720): avc: denied { map } for pid=4949 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) ppoll(&(0x7f00000038c0)=[{0xffffffffffffffff, 0x4}, {}], 0x2, 0x0, 0x0, 0x0) 09:57:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0), 0x0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:43 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c9000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2256.375945][ T5066] audit: backlog limit exceeded [ 2256.420991][ T5072] audit: audit_backlog=65 > audit_backlog_limit=64 09:57:43 executing program 1: 09:57:43 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c9000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0), 0x0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:43 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:43 executing program 1: 09:57:44 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c9000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(0xffffffffffffffff, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) ppoll(&(0x7f00000038c0)=[{0xffffffffffffffff, 0x4}, {}], 0x2, 0x0, 0x0, 0x0) 09:57:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:44 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:44 executing program 1: 09:57:44 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:44 executing program 5: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:44 executing program 1: 09:57:44 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:44 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:45 executing program 1: 09:57:45 executing program 5: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(0xffffffffffffffff, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) ppoll(&(0x7f00000038c0)=[{0xffffffffffffffff, 0x4}, {}], 0x2, 0x0, 0x0, 0x0) 09:57:45 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:45 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:45 executing program 5: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:45 executing program 1: 09:57:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(0xffffffffffffffff, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:45 executing program 1: 09:57:45 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:46 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:46 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:46 executing program 1: 09:57:46 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR, @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 09:57:46 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:46 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:46 executing program 1: 09:57:46 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR, @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:46 executing program 1: 09:57:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:46 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:46 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR, @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:47 executing program 1: 09:57:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) [ 2260.383504][ T26] kauditd_printk_skb: 394 callbacks suppressed [ 2260.383517][ T26] audit: type=1400 audit(1565344667.270:88086): avc: denied { map } for pid=5621 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2260.503273][ T26] audit: type=1400 audit(1565344667.270:88087): avc: denied { map } for pid=5621 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2260.604624][ T26] audit: type=1400 audit(1565344667.270:88088): avc: denied { map } for pid=5621 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2260.655960][ T26] audit: type=1400 audit(1565344667.320:88089): avc: denied { map } for pid=5621 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2260.699325][ T26] audit: type=1400 audit(1565344667.360:88090): avc: denied { map } for pid=5749 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2260.722650][ T26] audit: type=1400 audit(1565344667.370:88091): avc: denied { map } for pid=5749 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 09:57:47 executing program 1: 09:57:47 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:47 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2260.748082][ T26] audit: type=1400 audit(1565344667.370:88092): avc: denied { map } for pid=5749 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2260.813441][ T26] audit: type=1400 audit(1565344667.380:88093): avc: denied { map } for pid=5749 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2260.920395][ T26] audit: type=1400 audit(1565344667.380:88094): avc: denied { map } for pid=5749 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:47 executing program 1: 09:57:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:47 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:47 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2260.987381][ T26] audit: type=1400 audit(1565344667.420:88095): avc: denied { create } for pid=5721 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 09:57:48 executing program 1: 09:57:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 09:57:48 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 09:57:48 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:48 executing program 1: semget(0x3, 0x0, 0x249) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) 09:57:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) [ 2261.966909][ T5863] device nr0 entered promiscuous mode 09:57:49 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, 0x0, 0x0, 0xfffbc000) 09:57:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:49 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB, @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000000)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) listen(0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) dup2(r3, r2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 09:57:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 09:57:49 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB, @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000038c0)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) 09:57:49 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, 0x0, 0x0, 0xfffbc000) 09:57:49 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:57:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:49 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB, @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:49 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, 0x0, 0x0, 0xfffbc000) 09:57:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:49 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ppoll(&(0x7f00000038c0), 0x0, 0x0, 0x0, 0x0) 09:57:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000016) 09:57:50 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}], 0x1, 0xfffbc000) 09:57:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:50 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:50 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:57:50 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}], 0x1, 0xfffbc000) 09:57:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:50 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}], 0x1, 0xfffbc000) 09:57:50 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ppoll(&(0x7f00000038c0), 0x0, 0x0, 0x0, 0x0) 09:57:51 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {0x0}], 0x2, 0xfffbc000) 09:57:51 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000016) 09:57:53 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {0x0}], 0x2, 0xfffbc000) 09:57:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:53 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:53 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:57:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ppoll(&(0x7f00000038c0), 0x0, 0x0, 0x0, 0x0) 09:57:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) [ 2266.325028][ T26] kauditd_printk_skb: 318 callbacks suppressed [ 2266.325043][ T26] audit: type=1400 audit(1565344673.210:88414): avc: denied { create } for pid=6273 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 09:57:53 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {0x0}], 0x2, 0xfffbc000) [ 2266.436838][ T26] audit: type=1400 audit(1565344673.320:88415): avc: denied { map } for pid=6286 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:53 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2266.497189][ T26] audit: type=1400 audit(1565344673.340:88416): avc: denied { map } for pid=6287 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) [ 2266.606080][ T26] audit: type=1400 audit(1565344673.350:88417): avc: denied { map } for pid=6287 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:53 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/58, 0x3a}], 0x1, 0xfffbc000) [ 2266.695296][ T26] audit: type=1400 audit(1565344673.370:88418): avc: denied { map } for pid=6286 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2266.757053][ T26] audit: type=1400 audit(1565344673.370:88419): avc: denied { map } for pid=6286 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2266.781419][ T26] audit: type=1400 audit(1565344673.380:88420): avc: denied { map } for pid=6286 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:53 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2266.835212][ T26] audit: type=1400 audit(1565344673.380:88421): avc: denied { map } for pid=6286 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2267.012722][ T26] audit: type=1400 audit(1565344673.380:88422): avc: denied { map } for pid=6286 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2267.151167][ T26] audit: type=1400 audit(1565344673.380:88423): avc: denied { create } for pid=6289 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 09:57:56 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:57:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000016) 09:57:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ppoll(&(0x7f00000038c0)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) 09:57:56 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/58, 0x3a}], 0x1, 0xfffbc000) 09:57:56 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:56 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/58, 0x3a}], 0x1, 0xfffbc000) [ 2269.448542][ T6424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=513 sclass=netlink_route_socket pig=6424 comm=syz-executor.5 09:57:56 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2269.563698][ T6430] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=513 sclass=netlink_route_socket pig=6430 comm=syz-executor.5 09:57:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:56 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000180)=""/58, 0x3a}], 0x2, 0xfffbc000) 09:57:56 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d000000000000056000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2269.798687][ T6443] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=513 sclass=netlink_route_socket pig=6443 comm=syz-executor.5 09:57:57 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:57:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000016) 09:57:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0xc) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:57:59 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000180)=""/58, 0x3a}], 0x2, 0xfffbc000) 09:57:59 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d000000000000056000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:59 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:57:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ppoll(&(0x7f00000038c0)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) 09:57:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0xc) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) [ 2272.541190][ T26] kauditd_printk_skb: 105 callbacks suppressed [ 2272.541205][ T26] audit: type=1400 audit(1565344679.420:88529): avc: denied { create } for pid=6461 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 09:57:59 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d000000000000056000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:57:59 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) [ 2272.657434][ T26] audit: type=1400 audit(1565344679.540:88530): avc: denied { map } for pid=6489 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000016) 09:57:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0xc) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) [ 2272.796578][ T26] audit: type=1400 audit(1565344679.560:88531): avc: denied { map } for pid=6489 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:57:59 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000180)=""/58, 0x3a}], 0x2, 0xfffbc000) [ 2272.934675][ T26] audit: type=1400 audit(1565344679.560:88532): avc: denied { map } for pid=6489 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2273.019729][ T26] audit: type=1400 audit(1565344679.570:88533): avc: denied { map } for pid=6489 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:00 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:00 executing program 1: readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x8000008010500d, &(0x7f00000000c0)) 09:58:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, 0x0, 0x0) [ 2273.152168][ T26] audit: type=1400 audit(1565344679.580:88534): avc: denied { map } for pid=6489 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2273.254316][ T26] audit: type=1400 audit(1565344679.590:88535): avc: denied { map } for pid=6489 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:00 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0x0) 09:58:00 executing program 1: readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x8000008010500d, &(0x7f00000000c0)) 09:58:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ppoll(&(0x7f00000038c0)=[{0xffffffffffffffff, 0x4}], 0x1, 0x0, 0x0, 0x0) 09:58:00 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, 0x0, 0x0) [ 2273.361954][ T26] audit: type=1400 audit(1565344679.600:88536): avc: denied { map } for pid=6489 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2273.560977][ T26] audit: type=1400 audit(1565344679.660:88537): avc: denied { create } for pid=6512 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 09:58:00 executing program 1: readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x8000008010500d, &(0x7f00000000c0)) [ 2273.710425][ T26] audit: type=1400 audit(1565344679.680:88538): avc: denied { map } for pid=6529 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000016) 09:58:00 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:00 executing program 3: process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000380)=""/120, 0x78}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/udplite\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 09:58:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, 0x0, 0x0) 09:58:00 executing program 1: r0 = syz_open_dev$dspn(0x0, 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:01 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR, @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080), 0x0) 09:58:01 executing program 1: r0 = syz_open_dev$dspn(0x0, 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000038c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) 09:58:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@discard='discard'}]}) 09:58:01 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR, @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080), 0x0) [ 2274.864556][ T6856] JFS: discard option not supported on device 09:58:02 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR, @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:02 executing program 1: r0 = syz_open_dev$dspn(0x0, 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080), 0x0) 09:58:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE(r1, 0x4020ae76, &(0x7f0000000040)={0x4000}) 09:58:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x0) 09:58:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000", 0x10) 09:58:02 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:02 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000038c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) 09:58:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000", 0x10) 09:58:02 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:02 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, 0x0) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x0) 09:58:03 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:03 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000", 0x10) 09:58:03 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, 0x0) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:03 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB, @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000038c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) 09:58:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600", 0x18) 09:58:03 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600", 0x18) 09:58:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x25, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f00000001c0)="f2", 0x8ec0) dup2(r0, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x0) 09:58:04 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB, @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:04 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, 0x0) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) [ 2277.594068][ T26] kauditd_printk_skb: 360 callbacks suppressed [ 2277.594081][ T26] audit: type=1400 audit(1565344684.480:88899): avc: denied { map } for pid=7447 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:04 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, 0x0, 0x0) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) [ 2277.724316][ T26] audit: type=1400 audit(1565344684.480:88900): avc: denied { map } for pid=7447 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, 0x0) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:04 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB, @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2277.876783][ T26] audit: type=1400 audit(1565344684.480:88901): avc: denied { map } for pid=7447 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600", 0x18) [ 2278.021224][ T26] audit: type=1400 audit(1565344684.490:88902): avc: denied { map } for pid=7447 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:05 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) 09:58:05 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:05 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, 0x0, 0x0) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) [ 2278.241265][ T26] audit: type=1400 audit(1565344684.530:88903): avc: denied { map } for pid=7451 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) [ 2278.375031][ T7575] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2278.386945][ T26] audit: type=1400 audit(1565344684.540:88904): avc: denied { map } for pid=7451 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2278.392671][ T7576] audit: audit_backlog=65 > audit_backlog_limit=64 09:58:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca", 0x1c) 09:58:05 executing program 4: r0 = socket$inet(0x2, 0x2800080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x29fcc}], 0x1}, 0x0) [ 2278.433505][ T7580] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2278.464107][ T7580] audit: audit_lost=1922 audit_rate_limit=0 audit_backlog_limit=64 09:58:05 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) 09:58:05 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:05 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, 0x0, 0x0) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca", 0x1c) 09:58:05 executing program 4: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)=ANY=[@ANYBLOB="7b0009d21ddb02581200a08069deea29e2dd52f7eb696c7465720000002000e750b6ac891500006f2a161b000000000bdd9216c89f"], 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x220000890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x2, @raw_hdlc=&(0x7f00000001c0)}}) 09:58:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca", 0x1c) 09:58:06 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340), 0x0) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:06 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x61) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 09:58:06 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) 09:58:06 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca3100", 0x1e) 09:58:06 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:06 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340), 0x0) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:06 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) 09:58:07 executing program 3: ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:07 executing program 4: 09:58:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca3100", 0x1e) 09:58:07 executing program 0: ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) 09:58:07 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340), 0x0) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:07 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:07 executing program 3: ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:07 executing program 0: ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) 09:58:07 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{0x0}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:08 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:08 executing program 4: 09:58:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca3100", 0x1e) 09:58:08 executing program 3: ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:08 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{0x0}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:08 executing program 4: 09:58:08 executing program 0: ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) 09:58:08 executing program 5: 09:58:08 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:08 executing program 4: 09:58:08 executing program 0: r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) 09:58:08 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:08 executing program 5: 09:58:08 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{0x0}], 0x1) ioctl$int_in(r0, 0x8000008010500d, &(0x7f00000000c0)) 09:58:09 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:09 executing program 4: 09:58:09 executing program 5: 09:58:09 executing program 0: r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) 09:58:09 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2282.597495][ T26] kauditd_printk_skb: 362 callbacks suppressed [ 2282.597507][ T26] audit: type=1400 audit(1565344689.490:89232): avc: denied { map } for pid=7902 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:09 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x8000008010500d, &(0x7f00000000c0)) [ 2282.824739][ T26] audit: type=1400 audit(1565344689.490:89233): avc: denied { map } for pid=7902 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:09 executing program 4: 09:58:09 executing program 5: 09:58:09 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) [ 2283.021996][ T26] audit: type=1400 audit(1565344689.490:89234): avc: denied { map } for pid=7902 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:10 executing program 0: r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) [ 2283.147015][ T26] audit: type=1400 audit(1565344689.500:89235): avc: denied { map } for pid=7900 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:10 executing program 5: 09:58:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:10 executing program 4: [ 2283.298770][ T26] audit: type=1400 audit(1565344689.500:89236): avc: denied { map } for pid=7900 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2283.381342][ T26] audit: type=1400 audit(1565344689.500:89237): avc: denied { map } for pid=7900 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2283.458598][ T26] audit: type=1400 audit(1565344689.530:89238): avc: denied { map } for pid=7900 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:10 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:10 executing program 0: syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) 09:58:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6e}, [@ldst={0x7, 0xc0ffffff, 0x0, 0x0, 0x0, 0x500}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) [ 2283.614049][ T26] audit: type=1400 audit(1565344689.530:89239): avc: denied { map } for pid=7900 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:10 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x8000008010500d, &(0x7f00000000c0)) [ 2283.808983][ T26] audit: type=1400 audit(1565344689.540:89240): avc: denied { map } for pid=7902 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="11dca50d5e0b") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) [ 2283.956840][ T26] audit: type=1400 audit(1565344689.540:89241): avc: denied { map } for pid=7902 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000ec0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) 09:58:11 executing program 0: syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) 09:58:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:11 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:11 executing program 3: syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:11 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x8000008010500d, &(0x7f00000000c0)) 09:58:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="11dca50d5e0b") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 09:58:11 executing program 0: syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, &(0x7f0000000280)={0x0, "0ac8989b53f4c9330939953587e88f46cd905b98d4b5d77282db84542c6e44e8"}) 09:58:11 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd000000080001000a0c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:11 executing program 3: syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:12 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, 0x0) 09:58:12 executing program 3: syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c8f1fe68fb3d6ff44a150485a67d679ec73f68ec25d6800c41a2320bed5bac9109a3ec92d525ef91db4227bb3b9ea0df1834e029f7216eb52ab9d4cb9caad1f", "f36ec07674c3d73e462649f54cf59bedf83c20ca618149000270fe0eb8db6ade4431b05ae70838c622b7e8e4a3b249645e08cffb7f4be5ceafee08b835fd44a6", "0c335e5cd991abc51ef9f10e93728c61b903e34c0b057b2062b2fa1816d0ea7b"}) 09:58:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:12 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:12 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x0, &(0x7f00000000c0)) 09:58:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="11dca50d5e0b") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 09:58:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 09:58:12 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, 0x0) 09:58:13 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 09:58:13 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x0, &(0x7f00000000c0)) 09:58:13 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, 0x0) 09:58:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:13 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 09:58:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="11dca50d5e0b") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 09:58:13 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a280930206000100000001020b00000a0016000200280014000000190005407fffffff0022de1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d400", 0x55}], 0x1}, 0x0) 09:58:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x6) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 09:58:14 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x0, &(0x7f00000000c0)) 09:58:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) [ 2287.410222][ T8571] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2287.455753][ T8571] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 09:58:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") keyctl$chown(0x4, 0x0, 0x0, 0x0) 09:58:14 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:14 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0xe0fb00, 0x0, 0x0, 0x0) [ 2287.610307][ T26] kauditd_printk_skb: 345 callbacks suppressed [ 2287.610320][ T26] audit: type=1400 audit(1565344694.500:89566): avc: denied { map } for pid=8658 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2287.788070][ T26] audit: type=1400 audit(1565344694.570:89567): avc: denied { map } for pid=8658 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 09:58:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") keyctl$chown(0x4, 0x0, 0x0, 0x0) [ 2287.913110][ T26] audit: type=1400 audit(1565344694.580:89568): avc: denied { map } for pid=8658 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:14 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:14 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) [ 2288.022414][ T26] audit: type=1400 audit(1565344694.590:89569): avc: denied { map } for pid=8658 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2288.098303][ T26] audit: type=1400 audit(1565344694.590:89570): avc: denied { map } for pid=8658 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2288.184775][ T26] audit: type=1400 audit(1565344694.590:89571): avc: denied { map } for pid=8658 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback={0xfc00}}], 0x1c) 09:58:15 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, 0x0) 09:58:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") keyctl$chown(0x4, 0x0, 0x0, 0x0) 09:58:15 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:15 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) [ 2288.384447][ T26] audit: type=1400 audit(1565344694.590:89572): avc: denied { map } for pid=8658 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) [ 2288.595405][ T26] audit: type=1400 audit(1565344694.660:89573): avc: denied { map } for pid=8704 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2288.662619][ T26] audit: type=1400 audit(1565344694.680:89574): avc: denied { map } for pid=8704 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2288.701138][ T26] audit: type=1400 audit(1565344694.680:89575): avc: denied { map } for pid=8704 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:15 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) 09:58:15 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 09:58:15 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, 0x0) 09:58:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:16 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000380)={0x0, 0x80000, r1}) 09:58:16 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:16 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) 09:58:16 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r0, 0x0) 09:58:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 09:58:16 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r0, 0x0) 09:58:16 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) listen(r0, 0x2c) 09:58:16 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:16 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000380)={0x0, 0x80000, r1}) 09:58:16 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1) ioctl$int_in(r0, 0x8000008010500d, 0x0) 09:58:17 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r0, 0x0) 09:58:17 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) listen(r0, 0x2c) 09:58:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 09:58:17 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:17 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) listen(r0, 0x2c) 09:58:17 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="040000000700fd85c0a2562d6ad5d5d2ea14ebe8a676fb2e06ec9b7457183229289e3858a4212bebec0292fad3966d461c11d60bf1952be4220c655801bcd7209e94dd21b2f74dbc28bcec74d897d9485907b878950cefbfcb4e11cfe8e892a9601f2429ea0b661a604f6340236641d85e359aef2f99cb1740305086abe7e0f7336fbc836ae2f0a94a9845f4b9086c194dcb0e4b06046ebd006cc2425a10c0fedf165e8edea134ecb7b68427009bdf045b3d1dd44adf0bd9c89bc75194166241641458ea1a27b574723168cddc1060de1cc5377f2212cd13671823ac2251114d6e0ff1af1b19e0cb7eec6c3cb419f3e717f6cec5f91d01fd349e43c8"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000380)={0x0, 0x80000, r1}) 09:58:17 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000380)={0x0, 0x80000, r1}) 09:58:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:17 executing program 0: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(0xffffffffffffffff, 0x2c) 09:58:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:18 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:18 executing program 0: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(0xffffffffffffffff, 0x2c) 09:58:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 09:58:18 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000380)={0x0, 0x80000, r1}) 09:58:18 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="040000000700fd85c0a2562d6ad5d5d2ea14ebe8a676fb2e06ec9b7457183229289e3858a4212bebec0292fad3966d461c11d60bf1952be4220c655801bcd7209e94dd21b2f74dbc28bcec74d897d9485907b878950cefbfcb4e11cfe8e892a9601f2429ea0b661a604f6340236641d85e359aef2f99cb1740305086abe7e0f7336fbc836ae2f0a94a9845f4b9086c194dcb0e4b06046ebd006cc2425a10c0fedf165e8edea134ecb7b68427009bdf045b3d1dd44adf0bd9c89bc75194166241641458ea1a27b574723168cddc1060de1cc5377f2212cd13671823ac2251114d6e0ff1af1b19e0cb7eec6c3cb419f3e717f6cec5f91d01fd349e43c8"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000380)={0x0, 0x80000, r1}) 09:58:18 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 09:58:18 executing program 0: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(0xffffffffffffffff, 0x2c) 09:58:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:19 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) 09:58:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 09:58:19 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) 09:58:19 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2292.627090][ T26] kauditd_printk_skb: 349 callbacks suppressed [ 2292.627103][ T26] audit: type=1400 audit(1565344699.510:89925): avc: denied { map } for pid=9417 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.639904][ T26] audit: type=1400 audit(1565344699.530:89926): avc: denied { map } for pid=9417 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:19 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000380)={0x0, 0x80000, r1}) 09:58:19 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 09:58:19 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) 09:58:19 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2292.893175][ T26] audit: type=1400 audit(1565344699.580:89927): avc: denied { map } for pid=9417 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:19 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) [ 2293.117539][ T26] audit: type=1400 audit(1565344699.580:89928): avc: denied { map } for pid=9417 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:20 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) 09:58:20 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) [ 2293.358051][ T26] audit: type=1400 audit(1565344699.590:89929): avc: denied { map } for pid=9417 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:20 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="040000000700fd85c0a2562d6ad5d5d2ea14ebe8a676fb2e06ec9b7457183229289e3858a4212bebec0292fad3966d461c11d60bf1952be4220c655801bcd7209e94dd21b2f74dbc28bcec74d897d9485907b878950cefbfcb4e11cfe8e892a9601f2429ea0b661a604f6340236641d85e359aef2f99cb1740305086abe7e0f7336fbc836ae2f0a94a9845f4b9086c194dcb0e4b06046ebd006cc2425a10c0fedf165e8edea134ecb7b68427009bdf045b3d1dd44adf0bd9c89bc75194166241641458ea1a27b574723168cddc1060de1cc5377f2212cd13671823ac2251114d6e0ff1af1b19e0cb7eec6c3cb419f3e717f6cec5f91d01fd349e43c8"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000380)={0x0, 0x80000, r1}) 09:58:20 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) [ 2293.577370][ T26] audit: type=1400 audit(1565344699.590:89930): avc: denied { map } for pid=9417 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2293.699787][ T9444] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2293.706347][ T9444] audit: audit_lost=1942 audit_rate_limit=0 audit_backlog_limit=64 [ 2293.746974][ T9445] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2293.767397][ T9444] audit: backlog limit exceeded 09:58:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:20 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:21 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) 09:58:21 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) 09:58:21 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="040000000700fd85c0a2562d6ad5d5d2ea14ebe8a676fb2e06ec9b7457183229289e3858a4212bebec0292fad3966d461c11d60bf1952be4220c655801bcd7209e94dd21b2f74dbc28bcec74d897d9485907b878950cefbfcb4e11cfe8e892a9601f2429ea0b661a604f6340236641d85e359aef2f99cb1740305086abe7e0f7336fbc836ae2f0a94a9845f4b9086c194dcb0e4b06046ebd006cc2425a10c0fedf165e8edea134ecb7b68427009bdf045b3d1dd44adf0bd9c89bc75194166241641458ea1a27b574723168cddc1060de1cc5377f2212cd13671823ac2251114d6e0ff1af1b19e0cb7eec6c3cb419f3e717f6cec5f91d01fd349e43c8"]) 09:58:21 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) 09:58:21 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 09:58:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:22 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:22 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:58:22 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) 09:58:22 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) 09:58:22 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 09:58:23 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:23 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:58:23 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) 09:58:23 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) listen(r0, 0x2c) 09:58:23 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 09:58:23 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 09:58:23 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) listen(r0, 0x2c) 09:58:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6e}, [@ldst={0x7, 0xc0ffffff, 0x0, 0x0, 0x9601}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 09:58:23 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:23 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) 09:58:24 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, 0x0, 0x0) listen(r0, 0x2c) 09:58:24 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="726177000040000000da000000000000000000000000000000000000000000000300"/88], 0x58) 09:58:24 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r3}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r2}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:24 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) [ 2297.632500][ T26] kauditd_printk_skb: 317 callbacks suppressed [ 2297.632515][ T26] audit: type=1400 audit(1565344704.520:90246): avc: denied { map } for pid=9952 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:24 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) [ 2297.857489][ T26] audit: type=1400 audit(1565344704.530:90247): avc: denied { map } for pid=9952 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:24 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2298.005618][ T26] audit: type=1400 audit(1565344704.530:90248): avc: denied { map } for pid=9952 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2298.222957][ T26] audit: type=1400 audit(1565344704.530:90249): avc: denied { map } for pid=9952 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:25 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) 09:58:25 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) sched_setscheduler(0x0, 0x0, 0x0) [ 2298.451052][ T26] audit: type=1400 audit(1565344704.530:90250): avc: denied { map } for pid=9952 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:25 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r3}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r2}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:25 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0xd011, r0, 0x0) [ 2298.624793][T10077] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2298.668099][ T26] audit: type=1400 audit(1565344704.560:90251): avc: denied { map } for pid=9952 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2298.696316][T10077] audit: audit_lost=1944 audit_rate_limit=0 audit_backlog_limit=64 [ 2298.737898][T10077] audit: backlog limit exceeded [ 2298.776648][T10077] audit: audit_backlog=65 > audit_backlog_limit=64 09:58:25 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:25 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x6d) listen(r0, 0x2c) 09:58:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x0) listen(r0, 0x0) 09:58:25 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:26 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r3}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r2}}, 0x30) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:26 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/13, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:26 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(0xffffffffffffffff, 0x2c) 09:58:26 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) r2 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r2}) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:26 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) r2 = shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r4 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r4}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r3}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) shmctl$IPC_RMID(r2, 0x0) 09:58:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x0) listen(r0, 0x0) 09:58:26 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/13, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:26 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(0xffffffffffffffff, 0x2c) 09:58:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:27 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) getpid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:27 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r3}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r2}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) 09:58:27 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/13, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:27 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(0xffffffffffffffff, 0x2c) 09:58:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x0) listen(r0, 0x0) 09:58:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:27 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r3}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r2}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:58:28 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:28 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x0) 09:58:28 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:28 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r3}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r2}}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:58:28 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x0) 09:58:28 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x0) listen(r0, 0x0) 09:58:28 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:29 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x0) 09:58:29 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2302.638722][ T26] kauditd_printk_skb: 387 callbacks suppressed [ 2302.638735][ T26] audit: type=1400 audit(1565344709.530:90613): avc: denied { map } for pid=10504 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:29 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) r3 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r3}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xf908, @mcast1, 0x7f}, r2}}, 0x30) 09:58:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) [ 2302.885300][ T26] audit: type=1400 audit(1565344709.530:90614): avc: denied { map } for pid=10504 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:29 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0) 09:58:29 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r0, 0x0) listen(r0, 0x0) 09:58:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) [ 2303.072419][ T26] audit: type=1400 audit(1565344709.550:90615): avc: denied { map } for pid=10502 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:30 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) r2 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x92, 0xfffffffffffffffd, 0x8, 0x0, r2}) [ 2303.315659][ T26] audit: type=1400 audit(1565344709.550:90616): avc: denied { map } for pid=10502 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2303.497537][T10622] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2303.504088][T10622] audit: audit_lost=1954 audit_rate_limit=0 audit_backlog_limit=64 [ 2303.512772][T10618] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2303.552231][ T26] audit: type=1400 audit(1565344709.560:90617): avc: denied { map } for pid=10504 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2303.559941][T10618] audit: audit_lost=1955 audit_rate_limit=0 audit_backlog_limit=64 09:58:30 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0) [ 2303.608012][T10656] audit: audit_backlog=65 > audit_backlog_limit=64 09:58:30 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:30 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:30 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) getpid() 09:58:31 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0) 09:58:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:31 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:31 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:31 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:31 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0) 09:58:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:31 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:31 executing program 0: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0) 09:58:32 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000240)) keyctl$chown(0x4, 0x0, 0x0, 0x0) 09:58:32 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:32 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:32 executing program 0: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0) 09:58:32 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:32 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:33 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:33 executing program 0: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0) 09:58:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000240)) keyctl$chown(0x4, 0x0, 0x0, 0x0) 09:58:33 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:33 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:33 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:33 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:33 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0) 09:58:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000240)) keyctl$chown(0x4, 0x0, 0x0, 0x0) 09:58:33 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:33 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:34 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:34 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:34 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0) 09:58:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, 0x0) keyctl$chown(0x4, 0x0, r1, 0x0) 09:58:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:34 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) [ 2307.681563][ T26] kauditd_printk_skb: 413 callbacks suppressed [ 2307.681576][ T26] audit: type=1400 audit(1565344714.570:90991): avc: denied { map } for pid=11179 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:34 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) [ 2307.895822][ T26] audit: type=1400 audit(1565344714.640:90992): avc: denied { map } for pid=11179 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:34 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0) [ 2308.042157][ T26] audit: type=1400 audit(1565344714.660:90993): avc: denied { map } for pid=11179 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, 0x0) keyctl$chown(0x4, 0x0, r1, 0x0) [ 2308.272294][T11202] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2308.277632][ T26] audit: type=1400 audit(1565344714.700:90994): avc: denied { map } for pid=11183 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) [ 2308.454901][ T26] audit: type=1400 audit(1565344714.710:90996): avc: denied { map } for pid=11179 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, 0x0) keyctl$chown(0x4, 0x0, r1, 0x0) [ 2308.620530][ T26] audit: type=1400 audit(1565344714.720:90997): avc: denied { map } for pid=11179 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:35 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:35 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:35 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:35 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2308.854754][T11307] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2308.882896][ T26] audit: type=1400 audit(1565344714.700:90995): avc: denied { map } for pid=11183 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2309.024304][T11318] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2309.036173][T11315] audit: audit_backlog=65 > audit_backlog_limit=64 09:58:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) [ 2309.064753][T11323] audit: audit_backlog=65 > audit_backlog_limit=64 09:58:36 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:36 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:58:36 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) [ 2309.480126][T11425] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 09:58:36 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\x00P\x00\x00', @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) 09:58:36 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:58:36 executing program 3: socket$netlink(0x10, 0x3, 0x4000000000000004) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:36 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:36 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000300)={0x4, 0xffffffff7fffffff, 0x4, 0x20, 0x3, 0x9, 0x100000001, 0x7, 0x7, 0xff, 0xf4b5, 0x80000001, 0x3, 0xf2, &(0x7f0000000280)=""/78, 0x3, 0x80000000, 0x1}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) 09:58:36 executing program 3: socket$netlink(0x10, 0x3, 0x4000000000000004) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:36 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x35}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) prctl$PR_SET_FPEXC(0xc, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)=@security={'security\x00', 0xe, 0x4, 0x458, 0x3e0, 0x280, 0x138, 0x138, 0x280, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x4, 0x0, {[{{@uncond, 0x0, 0xf8, 0x138, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x0, 0x0, 0x0, 0x5}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'vlan0\x00', 'team0\x00'}, 0x0, 0xf0, 0x160, 0x0, {}, [@common=@unspec=@pkttype={0x28, 'pkttype\x00'}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "861c083875262f42a8ac495500201d0165dba84633ec09bddff7f7037df6ce31f40d98d7ea881852cb1821f7b2a6fb848e59223df2d61b96ed5ecc91aa9af65d"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4b8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x22, 0x0, &(0x7f0000000200)="41e4c23237cef7d625106c05be46400000000000000009aaad9788ef6448feb15ef3", 0x0, 0xe926}, 0x28) 09:58:36 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\x00P\x00\x00', @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:37 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:37 executing program 5: socket$unix(0x1, 0x1, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x20000000080, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) sched_setaffinity(r1, 0xfe75, &(0x7f00000002c0)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r4 = dup(0xffffffffffffffff) dup3(r3, r2, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKBSZSET(r5, 0x40081271, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgrp(0x0) getpgid(0x0) getpgid(0x0) r6 = getpgrp(0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x77) r7 = getpgrp(0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) capget(0x0, 0x0) r8 = socket$inet6(0xa, 0x400000000001, 0x0) r9 = dup(r8) ioctl$ASHMEM_SET_PROT_MASK(r9, 0x40087705, &(0x7f0000000280)={0x6}) ptrace$setregset(0x4205, r7, 0x201, &(0x7f0000000240)={&(0x7f0000000740)}) ioctl$int_in(r9, 0x5452, &(0x7f0000000600)=0xe2e) fcntl$lock(r4, 0x24, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ptrace$setregset(0x4205, r6, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) io_setup(0x8, &(0x7f00000000c0)=0x0) io_cancel(r10, 0x0, 0x0) setsockopt$inet6_tcp_int(r9, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r8, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r8, 0x0, 0x88, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r11 = open(&(0x7f0000000400)='./bus\x00', 0x141046, 0x0) ftruncate(r11, 0x2007fff) sendfile(r9, r11, 0x0, 0x8000fffffffe) 09:58:37 executing program 3: socket$netlink(0x10, 0x3, 0x4000000000000004) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e05a5", 0x58}], 0x1) 09:58:37 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:37 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x381000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:38 executing program 0: r0 = socket(0x840000000002, 0x3, 0xff) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@dev, @mcast1, @ipv4={[], [], @multicast2}}) 09:58:38 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:38 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\x00P\x00\x00', @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, 0x0, 0x0) 09:58:38 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) fcntl$setstatus(r2, 0x4, 0x2c04) 09:58:38 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/unix\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000500)=""/112, 0x70}], 0x1, 0x4c000000) 09:58:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, 0x0, 0x0) 09:58:38 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:38 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:39 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, 0x0, 0x0) 09:58:39 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd1000000000000073013500000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="a3e4c23237eec58825106c64be56", 0x0}, 0x28) 09:58:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:39 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:39 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) [ 2312.724455][ T26] kauditd_printk_skb: 317 callbacks suppressed [ 2312.724468][ T26] audit: type=1400 audit(1565344719.610:91297): avc: denied { map } for pid=11825 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040), 0x0) [ 2312.913776][ T26] audit: type=1400 audit(1565344719.630:91298): avc: denied { map } for pid=11824 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:39 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) [ 2313.121792][ T26] audit: type=1400 audit(1565344719.630:91299): avc: denied { map } for pid=11824 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:40 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x401) [ 2313.341764][ T26] audit: type=1400 audit(1565344719.630:91300): avc: denied { map } for pid=11824 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:40 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) [ 2313.506603][T11887] audit: audit_backlog=65 > audit_backlog_limit=64 09:58:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040), 0x0) [ 2313.531572][ T26] audit: type=1400 audit(1565344719.660:91301): avc: denied { map } for pid=11825 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2313.566716][T11887] audit: audit_lost=1976 audit_rate_limit=0 audit_backlog_limit=64 09:58:40 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2313.620548][T12015] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2313.630952][T11887] audit: backlog limit exceeded [ 2313.638921][T12015] audit: audit_lost=1977 audit_rate_limit=0 audit_backlog_limit=64 09:58:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:40 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:40 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040), 0x0) 09:58:41 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:41 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:41 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:41 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{0x0}], 0x1) 09:58:41 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{0x0}], 0x1) 09:58:41 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:42 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{0x0}], 0x1) 09:58:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:42 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:42 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)}], 0x1) 09:58:42 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:42 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)}], 0x1) 09:58:43 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:43 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:43 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:43 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)}], 0x1) 09:58:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:44 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:44 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f640094000589", 0x2c}], 0x1) 09:58:44 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:58:44 executing program 5: r0 = socket$kcm(0x2, 0x0, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:44 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) 09:58:44 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f640094000589", 0x2c}], 0x1) [ 2317.737233][ T26] kauditd_printk_skb: 347 callbacks suppressed [ 2317.737247][ T26] audit: type=1400 audit(1565344724.620:91648): avc: denied { map } for pid=12458 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:44 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) [ 2317.923886][ T26] audit: type=1400 audit(1565344724.690:91649): avc: denied { map } for pid=12458 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2318.114962][ T26] audit: type=1400 audit(1565344724.730:91650): avc: denied { map } for pid=12477 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f640094000589", 0x2c}], 0x1) [ 2318.312944][ T26] audit: type=1400 audit(1565344724.730:91651): avc: denied { map } for pid=12477 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:45 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) [ 2318.461018][ T26] audit: type=1400 audit(1565344724.740:91652): avc: denied { map } for pid=12474 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:45 executing program 5: r0 = socket$kcm(0x2, 0x0, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) [ 2318.539676][T12670] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2318.598580][T12670] audit: audit_lost=1978 audit_rate_limit=0 audit_backlog_limit=64 09:58:45 executing program 4: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) [ 2318.642397][ T26] audit: type=1400 audit(1565344724.740:91653): avc: denied { map } for pid=12474 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2318.676521][T12670] audit: backlog limit exceeded 09:58:45 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) [ 2318.731176][T12670] audit: audit_backlog=65 > audit_backlog_limit=64 09:58:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080", 0x42}], 0x1) 09:58:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:46 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:46 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) 09:58:46 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0xaf02, 0x0) 09:58:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080", 0x42}], 0x1) 09:58:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:46 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:46 executing program 5: r0 = socket$kcm(0x2, 0x0, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:46 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) 09:58:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080", 0x42}], 0x1) 09:58:46 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:46 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) 09:58:47 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0xaf02, 0x0) 09:58:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd0000000800010009", 0x4d}], 0x1) 09:58:47 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) 09:58:47 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) 09:58:47 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:47 executing program 5: socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:47 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000050000000000000cd00000000000000", @ANYPTR, @ANYBLOB='\x00 \x00'/14, @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00k\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000026c0)=ANY=[], @ANYBLOB="000000000000000000d00000000000005600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYBLOB="00000000000000000000000000000000c900000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYBLOB="000000000000000000600000000000003d0000000efaffffffffffffffbda5513832612f5a832565daacf3c8dd9eb342c5d30793f7ad2554b861d577c48618925250a4948370a9fec2aeaeb8d1c7f4c9dece47c2b636764c97266d4bdacc46ddd0"]) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0xaf02, 0x0) 09:58:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd0000000800010009", 0x4d}], 0x1) 09:58:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) 09:58:48 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) 09:58:48 executing program 5: socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:48 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd0000000800010009", 0x4d}], 0x1) 09:58:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001500add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 09:58:48 executing program 0: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_int(r0, &(0x7f0000000040), 0x12) 09:58:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff00", 0x53}], 0x1) 09:58:49 executing program 4: semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) getresgid(0x0, 0x0, 0x0) 09:58:49 executing program 5: socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:49 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001500add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 09:58:49 executing program 0: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_int(r0, &(0x7f0000000040), 0x12) 09:58:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff00", 0x53}], 0x1) [ 2322.941756][ T26] kauditd_printk_skb: 384 callbacks suppressed [ 2322.941770][ T26] audit: type=1400 audit(1565344729.830:92021): avc: denied { map } for pid=13005 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:49 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, 0x0, 0x0) 09:58:50 executing program 0: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_int(r0, &(0x7f0000000040), 0x12) [ 2323.079372][ T26] audit: type=1400 audit(1565344729.880:92022): avc: denied { map } for pid=13005 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001500add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 09:58:50 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, r0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) [ 2323.270160][ T26] audit: type=1400 audit(1565344729.880:92023): avc: denied { map } for pid=13005 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000003c0), 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x7, 0x12) [ 2323.461533][ T26] audit: type=1400 audit(1565344729.900:92024): avc: denied { map } for pid=13005 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:50 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, 0x0, 0x0) [ 2323.617398][ T26] audit: type=1400 audit(1565344729.900:92025): avc: denied { map } for pid=13005 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:58:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff00", 0x53}], 0x1) [ 2323.782388][ T26] audit: type=1400 audit(1565344729.910:92026): avc: denied { map } for pid=13005 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2323.878137][T13024] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2323.885380][T13025] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2323.911425][T13030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2323.928861][T13025] audit: audit_lost=1985 audit_rate_limit=0 audit_backlog_limit=64 09:58:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001500add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 09:58:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:51 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:51 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, 0x0, 0x0) 09:58:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e", 0x56}], 0x1) 09:58:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$msdos(&(0x7f00000003c0)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}, {@fat=@dmask={'dmask'}}]}) 09:58:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:51 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001500add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 09:58:51 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) 09:58:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e", 0x56}], 0x1) 09:58:51 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) 09:58:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 09:58:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c56020c7fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000008000100090c0900fcff0000040e", 0x56}], 0x1) [ 2325.107622][T13064] FAT-fs (loop4): bogus number of reserved sectors 09:58:52 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000000000000000007000000831b04e0000002ac1e00007f0000017f000001ffffffffac1414000000000000", @ANYBLOB], 0x30}, 0x0) [ 2325.173989][T13064] FAT-fs (loop4): Can't find a valid FAT filesystem 09:58:52 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001500add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 09:58:52 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0xf}}, 0x20) [ 2325.589642][T13075] WARNING: CPU: 0 PID: 13075 at fs/block_dev.c:1899 __blkdev_put+0x6ba/0x810 [ 2325.598450][T13075] Kernel panic - not syncing: panic_on_warn set ... [ 2325.605065][T13075] CPU: 0 PID: 13075 Comm: blkid Not tainted 5.3.0-rc3+ #96 [ 2325.612261][T13075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2325.622318][T13075] Call Trace: [ 2325.625617][T13075] dump_stack+0x172/0x1f0 [ 2325.629950][T13075] ? __blkdev_put+0x680/0x810 [ 2325.634637][T13075] panic+0x2dc/0x755 [ 2325.638542][T13075] ? add_taint.cold+0x16/0x16 [ 2325.643237][T13075] ? __kasan_check_write+0x14/0x20 [ 2325.648447][T13075] ? __warn.cold+0x5/0x4c [ 2325.652875][T13075] ? __warn+0xe7/0x1e0 [ 2325.656943][T13075] ? __blkdev_put+0x6ba/0x810 [ 2325.661622][T13075] __warn.cold+0x20/0x4c [ 2325.665955][T13075] ? __blkdev_put+0x6ba/0x810 [ 2325.670638][T13075] report_bug+0x263/0x2b0 [ 2325.675092][T13075] do_error_trap+0x11b/0x200 [ 2325.679685][T13075] do_invalid_op+0x37/0x50 [ 2325.684084][T13075] ? __blkdev_put+0x6ba/0x810 [ 2325.688760][T13075] invalid_op+0x23/0x30 [ 2325.692910][T13075] RIP: 0010:__blkdev_put+0x6ba/0x810 [ 2325.698179][T13075] Code: 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 24 fd ff ff 48 8b bd 50 ff ff ff e8 00 79 e6 ff e9 13 fd ff ff e8 46 60 ac ff <0f> 0b e9 dc fa ff ff 48 89 cf e8 c7 78 e6 ff e9 6a fa ff ff 48 8b [ 2325.717853][T13075] RSP: 0018:ffff88805adbfc90 EFLAGS: 00010293 [ 2325.723913][T13075] RAX: ffff888088998440 RBX: ffff88808e753240 RCX: ffffffff81c62414 [ 2325.731871][T13075] RDX: 0000000000000000 RSI: ffffffff81c6293a RDI: 0000000000000005 [ 2325.739840][T13075] RBP: ffff88805adbfd88 R08: ffff888088998440 R09: ffffed1011cea64c [ 2325.747794][T13075] R10: ffff88805adbfc80 R11: ffff88808e75325f R12: 0000000000000002 [ 2325.756025][T13075] R13: dffffc0000000000 R14: ffff88808e753258 R15: ffff88808e753258 [ 2325.763997][T13075] ? __blkdev_put+0x194/0x810 [ 2325.768659][T13075] ? __blkdev_put+0x6ba/0x810 [ 2325.773340][T13075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2325.779650][T13075] ? bd_set_size+0xb0/0xb0 [ 2325.784079][T13075] ? wait_for_completion+0x440/0x440 [ 2325.789450][T13075] blkdev_put+0x98/0x560 [ 2325.793681][T13075] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2325.799910][T13075] blkdev_close+0x8b/0xb0 [ 2325.804243][T13075] __fput+0x2ff/0x890 [ 2325.808215][T13075] ? blkdev_put+0x560/0x560 [ 2325.812709][T13075] ____fput+0x16/0x20 [ 2325.816695][T13075] task_work_run+0x145/0x1c0 [ 2325.821290][T13075] exit_to_usermode_loop+0x316/0x380 [ 2325.826583][T13075] do_syscall_64+0x5a9/0x6a0 [ 2325.831163][T13075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2325.837040][T13075] RIP: 0033:0x7f8a4db7c2b0 [ 2325.841440][T13075] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 2325.861031][T13075] RSP: 002b:00007ffd41677cb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 2325.869442][T13075] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f8a4db7c2b0 [ 2325.877418][T13075] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2325.885374][T13075] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 2325.893341][T13075] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000200a030 [ 2325.901312][T13075] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005 [ 2325.910584][T13075] Kernel Offset: disabled [ 2325.914914][T13075] Rebooting in 86400 seconds..