ent_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000004c0)) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 21:13:55 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x2000c0884123, &(0x7f0000000000)) 21:13:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000004c0)) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 21:13:55 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000340)={0x9, 0x0, 0x4, 0x7ff, 0x0, 0xe0}) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x1, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@generic={0x7, 0x681e, 0x5, 0x8, 0x2}, @exit]}, &(0x7f0000000040)='syzkaller\x00', 0xffff, 0xd4, &(0x7f00000001c0)=""/212, 0x40f00, 0x1, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000300)={0x3, 0x7}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x3, 0x3f}, 0x10}, 0x70) openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x400000, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, &(0x7f0000000640)=[@textreal={0x8, &(0x7f00000005c0)="0f18e60f01b808002e0f01cf0f239f66b9800000c00f326635008000000f30baa000edba2100ec66b9020a000066b87a8b000666ba000000000f30f30f092e0fc7a90000", 0x44}], 0x1, 0x100, &(0x7f0000000680), 0x0) [ 1563.059423][ T26] audit: type=1400 audit(1557263635.100:28781): avc: denied { ioctl } for pid=30197 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1563.231336][ T26] audit: type=1400 audit(1557263635.240:28782): avc: denied { map } for pid=30215 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1563.422569][ T26] audit: type=1400 audit(1557263635.240:28783): avc: denied { map } for pid=30215 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1563.612322][ T26] audit: type=1400 audit(1557263635.280:28784): avc: denied { map } for pid=30215 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:13:56 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x2000c0884123, &(0x7f0000000000)) [ 1563.888207][ T26] audit: type=1400 audit(1557263635.280:28785): avc: denied { map } for pid=30215 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1564.011873][ T26] audit: type=1400 audit(1557263635.310:28786): avc: denied { map } for pid=30215 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:13:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000004c0)) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 1564.252028][ T26] audit: type=1400 audit(1557263635.360:28787): avc: denied { map } for pid=30215 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1564.537978][ T26] audit: type=1400 audit(1557263635.420:28788): avc: denied { map } for pid=30215 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:13:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000004c0)) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 21:13:57 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x2000c0884123, &(0x7f0000000000)) 21:13:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local}, &(0x7f00000004c0)=0x20) 21:13:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000004c0)) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 21:13:58 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x2000c0884123, &(0x7f0000000000)) 21:13:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local}, &(0x7f00000004c0)=0x20) [ 1567.959476][ T26] kauditd_printk_skb: 117 callbacks suppressed [ 1567.959490][ T26] audit: type=1400 audit(1557263640.170:28906): avc: denied { map } for pid=30661 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1568.052720][ T26] audit: type=1400 audit(1557263640.180:28907): avc: denied { map } for pid=30661 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1568.078580][ T26] audit: type=1400 audit(1557263640.200:28908): avc: denied { map } for pid=30661 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") semtimedop(0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}) syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20150ffce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0ff7bd0a634a16014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1568.159862][ T26] audit: type=1400 audit(1557263640.210:28909): avc: denied { map } for pid=30661 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000004c0)) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 21:14:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local}, &(0x7f00000004c0)=0x20) 21:14:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local}, &(0x7f00000004c0)=0x20) 21:14:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000004c0)) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 21:14:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) [ 1568.311664][ T26] audit: type=1400 audit(1557263640.270:28910): avc: denied { map } for pid=30661 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1568.507980][ T26] audit: type=1400 audit(1557263640.270:28911): avc: denied { map } for pid=30661 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local}, &(0x7f00000004c0)=0x20) 21:14:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local}, &(0x7f00000004c0)=0x20) [ 1568.683780][ T26] audit: type=1400 audit(1557263640.330:28912): avc: denied { map } for pid=30661 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1568.868038][ T26] audit: type=1400 audit(1557263640.360:28913): avc: denied { map } for pid=30661 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1569.081504][ T26] audit: type=1400 audit(1557263640.360:28914): avc: denied { map } for pid=30661 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1569.310944][ T26] audit: type=1400 audit(1557263640.440:28915): avc: denied { map } for pid=30661 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local}, &(0x7f00000004c0)=0x20) 21:14:02 executing program 3: ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000000)={0x0, 0x0, 0x2}) syz_execute_func(&(0x7f0000000500)="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") 21:14:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x6, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) recvmmsg(r0, &(0x7f0000000180), 0x400000000000370, 0x6, &(0x7f0000000100)={0x77359400}) 21:14:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 21:14:03 executing program 3: ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000000)={0x0, 0x0, 0x2}) syz_execute_func(&(0x7f0000000500)="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") 21:14:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 21:14:03 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 21:14:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a000007000000000013002d54036205001a000000e600001000e0c9000200"/56], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x20, 0x0) 21:14:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 21:14:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x6, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) recvmmsg(r0, &(0x7f0000000180), 0x400000000000370, 0x6, &(0x7f0000000100)={0x77359400}) 21:14:04 executing program 3: ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000000)={0x0, 0x0, 0x2}) syz_execute_func(&(0x7f0000000500)="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") [ 1572.408013][ C1] net_ratelimit: 8 callbacks suppressed [ 1572.408024][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1572.419651][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:14:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) [ 1572.888093][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1572.893944][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1572.981450][ T26] kauditd_printk_skb: 143 callbacks suppressed [ 1572.981467][ T26] audit: type=1400 audit(1557263645.190:29059): avc: denied { map } for pid=31048 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1573.200320][ T26] audit: type=1400 audit(1557263645.190:29060): avc: denied { map } for pid=31037 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1573.347281][ T26] audit: type=1400 audit(1557263645.250:29061): avc: denied { map } for pid=31037 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a000007000000000013002d54036205001a000000e600001000e0c9000200"/56], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x20, 0x0) [ 1573.522901][ T26] audit: type=1400 audit(1557263645.280:29062): avc: denied { map } for pid=31037 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) 21:14:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x6, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) recvmmsg(r0, &(0x7f0000000180), 0x400000000000370, 0x6, &(0x7f0000000100)={0x77359400}) 21:14:05 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) [ 1573.732800][ T26] audit: type=1400 audit(1557263645.290:29063): avc: denied { ioctl } for pid=31051 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:14:06 executing program 3: ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000000)={0x0, 0x0, 0x2}) syz_execute_func(&(0x7f0000000500)="994a2ae92c25964c0f05bf00000020c4a37bf0c5bf41e2e9c422e9aabb3c00000064f3460f1b2800000f383a9e02000000c4a1f82866664e5bc4a265aa104b2636a00f38091e2fa2631bc421045f4607c421dd589fc4e10bf8b6f6a426a42645f61964c402994725fe7f00000f4f1967d82e0f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efc4c3194198ac77000007459d6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc402712f358f0000000f9f3c6436b266450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045cccd77db9b9426507af0f0000000f5fd243caca460f2ad0f30f5ea5a9a50000ffff660f79ca5536f347aab03a00a2f1fbfb766208cf") [ 1573.903887][ T26] audit: type=1400 audit(1557263645.300:29064): avc: denied { map } for pid=31048 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1574.063722][ T26] audit: type=1400 audit(1557263645.310:29065): avc: denied { ioctl } for pid=31009 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1574.243273][ T26] audit: type=1400 audit(1557263645.330:29066): avc: denied { ioctl } for pid=31058 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1574.424164][ T26] audit: type=1400 audit(1557263645.330:29068): avc: denied { map } for pid=31048 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) [ 1574.650576][ T26] audit: type=1400 audit(1557263645.330:29069): avc: denied { map } for pid=31048 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:07 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a000007000000000013002d54036205001a000000e600001000e0c9000200"/56], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x20, 0x0) [ 1574.968058][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1574.973998][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:14:07 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 21:14:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 21:14:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 21:14:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x6, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) recvmmsg(r0, &(0x7f0000000180), 0x400000000000370, 0x6, &(0x7f0000000100)={0x77359400}) 21:14:08 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) [ 1576.568007][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1576.573881][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:14:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a000007000000000013002d54036205001a000000e600001000e0c9000200"/56], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x20, 0x0) [ 1577.048039][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1577.053965][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1577.448159][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1577.454043][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:14:09 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 21:14:09 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 21:14:09 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 21:14:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 21:14:09 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) [ 1578.163116][ T26] kauditd_printk_skb: 156 callbacks suppressed [ 1578.163132][ T26] audit: type=1400 audit(1557263650.370:29225): avc: denied { map } for pid=31488 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1578.347978][ T26] audit: type=1400 audit(1557263650.420:29226): avc: denied { map } for pid=31488 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1578.489930][ T26] audit: type=1400 audit(1557263650.440:29227): avc: denied { map } for pid=31488 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1578.647978][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1578.653861][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1578.670519][ T26] audit: type=1400 audit(1557263650.460:29228): avc: denied { map } for pid=31488 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x6, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) recvmmsg(r0, &(0x7f0000000180), 0x400000000000370, 0x6, &(0x7f0000000100)={0x77359400}) [ 1578.836231][ T26] audit: type=1400 audit(1557263650.510:29229): avc: denied { map } for pid=31488 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1579.022745][ T26] audit: type=1400 audit(1557263650.520:29230): avc: denied { ioctl } for pid=31492 comm="syz-executor.3" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1579.128092][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1579.133997][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:14:11 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) [ 1579.246766][ T26] audit: type=1400 audit(1557263650.530:29231): avc: denied { map } for pid=31510 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:11 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) [ 1579.417995][ T26] audit: type=1400 audit(1557263650.550:29232): avc: denied { map } for pid=31510 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1579.528079][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1579.533950][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1579.549836][ T26] audit: type=1400 audit(1557263650.560:29233): avc: denied { map } for pid=31510 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:11 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 21:14:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) [ 1579.691999][ T26] audit: type=1400 audit(1557263650.560:29234): avc: denied { map } for pid=31510 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:12 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x0) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000180)='./file0\x00', 0x0) [ 1580.337953][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1580.343851][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:14:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x6, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) recvmmsg(r0, &(0x7f0000000180), 0x400000000000370, 0x6, &(0x7f0000000100)={0x77359400}) [ 1581.056554][T31886] overlayfs: failed to resolve './file1': -2 21:14:13 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x0) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000180)='./file0\x00', 0x0) 21:14:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000b00)="f2af91220f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f98f0938966803023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a96641910f6c244d964d8dbaa9baa9ae955b955f420f383c02c401405c6bfdd70fc7f88f6878ccf60bfbab196464460f366b323c8f3c8fc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005493") 21:14:13 executing program 4: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8000fffffffb) clock_adjtime(0x0, 0x0) 21:14:13 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x17c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 21:14:14 executing program 3: dup(0xffffffffffffffff) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000003c0), 0x812e46f0, 0x0}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 21:14:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x6, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) recvmmsg(r0, &(0x7f0000000180), 0x400000000000370, 0x6, &(0x7f0000000100)={0x77359400}) [ 1582.680877][T32127] overlayfs: failed to resolve './file1': -2 [ 1582.808058][ C1] net_ratelimit: 8 callbacks suppressed [ 1582.808069][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1582.819578][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:14:15 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x0) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000180)='./file0\x00', 0x0) 21:14:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000b00)="f2af91220f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f98f0938966803023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a96641910f6c244d964d8dbaa9baa9ae955b955f420f383c02c401405c6bfdd70fc7f88f6878ccf60bfbab196464460f366b323c8f3c8fc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005493") 21:14:15 executing program 4: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8000fffffffb) clock_adjtime(0x0, 0x0) [ 1583.288072][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1583.293991][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:14:15 executing program 0: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8000fffffffb) clock_adjtime(0x0, 0x0) 21:14:15 executing program 1: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8000fffffffb) clock_adjtime(0x0, 0x0) [ 1583.775896][ T26] kauditd_printk_skb: 177 callbacks suppressed [ 1583.775912][ T26] audit: type=1400 audit(1557263655.980:29412): avc: denied { map } for pid=32305 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1583.927335][ T26] audit: type=1400 audit(1557263656.020:29413): avc: denied { map } for pid=32305 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1584.077419][ T26] audit: type=1400 audit(1557263656.050:29414): avc: denied { map } for pid=32305 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:16 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000480), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x7, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3d556e4621331a24"}}, 0x48}}, 0x0) [ 1584.256205][ T26] audit: type=1400 audit(1557263656.070:29415): avc: denied { map } for pid=32305 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1584.404515][ T26] audit: type=1400 audit(1557263656.100:29416): avc: denied { ioctl } for pid=32315 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1584.589292][T32357] overlayfs: failed to resolve './file1': -2 [ 1584.631444][ T26] audit: type=1400 audit(1557263656.120:29417): avc: denied { map } for pid=32320 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1584.798035][ T26] audit: type=1400 audit(1557263656.120:29419): avc: denied { map } for pid=32305 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000b00)="f2af91220f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f98f0938966803023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a96641910f6c244d964d8dbaa9baa9ae955b955f420f383c02c401405c6bfdd70fc7f88f6878ccf60bfbab196464460f366b323c8f3c8fc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005493") [ 1584.966692][ T26] audit: type=1400 audit(1557263656.120:29418): avc: denied { map } for pid=32320 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:17 executing program 4: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8000fffffffb) clock_adjtime(0x0, 0x0) [ 1585.169219][ T26] audit: type=1400 audit(1557263656.150:29420): avc: denied { map } for pid=32320 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:17 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x0) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000180)='./file0\x00', 0x0) [ 1585.338028][ T26] audit: type=1400 audit(1557263656.150:29421): avc: denied { map } for pid=32320 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:18 executing program 1: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8000fffffffb) clock_adjtime(0x0, 0x0) 21:14:18 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000480), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x7, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3d556e4621331a24"}}, 0x48}}, 0x0) 21:14:18 executing program 0: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8000fffffffb) clock_adjtime(0x0, 0x0) 21:14:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000b00)="f2af91220f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f98f0938966803023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a96641910f6c244d964d8dbaa9baa9ae955b955f420f383c02c401405c6bfdd70fc7f88f6878ccf60bfbab196464460f366b323c8f3c8fc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005493") 21:14:19 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000480), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x7, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3d556e4621331a24"}}, 0x48}}, 0x0) 21:14:19 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30}, 0x30) 21:14:20 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000480), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x7, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3d556e4621331a24"}}, 0x48}}, 0x0) 21:14:20 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30}, 0x30) 21:14:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000a880)={0x0, 0x0, 0x0}, 0x0) [ 1588.817149][ T26] kauditd_printk_skb: 147 callbacks suppressed [ 1588.817166][ T26] audit: type=1400 audit(1557263661.020:29569): avc: denied { map } for pid=415 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:21 executing program 1: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8000fffffffb) clock_adjtime(0x0, 0x0) 21:14:21 executing program 4: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8000fffffffb) clock_adjtime(0x0, 0x0) 21:14:21 executing program 0: fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8000fffffffb) clock_adjtime(0x0, 0x0) [ 1588.980646][ T26] audit: type=1400 audit(1557263661.040:29570): avc: denied { map } for pid=415 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1589.158565][ T26] audit: type=1400 audit(1557263661.060:29571): avc: denied { map } for pid=415 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:21 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") [ 1589.369546][ T26] audit: type=1400 audit(1557263661.110:29572): avc: denied { ioctl } for pid=425 comm="syz-executor.3" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:14:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000a880)={0x0, 0x0, 0x0}, 0x0) [ 1589.570256][ T26] audit: type=1400 audit(1557263661.170:29573): avc: denied { map } for pid=415 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1589.731478][ T26] audit: type=1400 audit(1557263661.170:29574): avc: denied { map } for pid=415 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30}, 0x30) [ 1589.874788][ T26] audit: type=1400 audit(1557263661.240:29575): avc: denied { map } for pid=415 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1590.023154][ T26] audit: type=1400 audit(1557263661.240:29576): avc: denied { map } for pid=415 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1590.211801][ T26] audit: type=1400 audit(1557263661.310:29577): avc: denied { map } for pid=427 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1590.376037][ T26] audit: type=1400 audit(1557263661.310:29578): avc: denied { map } for pid=427 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000a880)={0x0, 0x0, 0x0}, 0x0) 21:14:23 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30}, 0x30) 21:14:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000a880)={0x0, 0x0, 0x0}, 0x0) 21:14:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:14:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000a880)={0x0, 0x0, 0x0}, 0x0) 21:14:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)={0xa4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x5}, 0x4000) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000480)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") 21:14:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80000000000000a}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000240)=@fragment, 0x8) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 21:14:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000a880)={0x0, 0x0, 0x0}, 0x0) 21:14:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c4600000600000000"], 0xb) sendfile(r2, r3, 0x0, 0x8000fffffffa) 21:14:24 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") 21:14:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80000000000000a}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000240)=@fragment, 0x8) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 21:14:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f000000a880)={0x0, 0x0, 0x0}, 0x0) 21:14:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1593.854710][ T26] kauditd_printk_skb: 139 callbacks suppressed [ 1593.854727][ T26] audit: type=1400 audit(1557263666.060:29718): avc: denied { map } for pid=930 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1593.993927][ T26] audit: type=1400 audit(1557263666.060:29719): avc: denied { map } for pid=930 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1594.114898][ T26] audit: type=1400 audit(1557263666.130:29720): avc: denied { map } for pid=930 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:26 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80000000000000a}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000240)=@fragment, 0x8) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 21:14:26 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80000000000000a}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000240)=@fragment, 0x8) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) [ 1594.263726][ T26] audit: type=1400 audit(1557263666.130:29721): avc: denied { map } for pid=930 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c4600000600000000"], 0xb) sendfile(r2, r3, 0x0, 0x8000fffffffa) [ 1594.400017][ T26] audit: type=1400 audit(1557263666.170:29722): avc: denied { ioctl } for pid=929 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:14:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:14:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)={0xa4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x5}, 0x4000) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000480)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") [ 1594.648654][ T26] audit: type=1400 audit(1557263666.170:29723): avc: denied { map } for pid=930 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:26 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") [ 1594.801527][ T26] audit: type=1400 audit(1557263666.190:29724): avc: denied { map } for pid=930 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1594.938742][ T26] audit: type=1400 audit(1557263666.200:29725): avc: denied { ioctl } for pid=931 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:14:27 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80000000000000a}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000240)=@fragment, 0x8) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) [ 1595.131364][ T26] audit: type=1400 audit(1557263666.230:29726): avc: denied { map } for pid=930 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1595.284209][ T26] audit: type=1400 audit(1557263666.310:29727): avc: denied { map } for pid=930 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80000000000000a}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000240)=@fragment, 0x8) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 21:14:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:14:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c4600000600000000"], 0xb) sendfile(r2, r3, 0x0, 0x8000fffffffa) 21:14:28 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") 21:14:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)={0xa4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x5}, 0x4000) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000480)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") 21:14:28 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80000000000000a}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000240)=@fragment, 0x8) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 21:14:28 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") 21:14:29 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") 21:14:29 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") 21:14:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c4600000600000000"], 0xb) sendfile(r2, r3, 0x0, 0x8000fffffffa) 21:14:30 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") 21:14:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)={0xa4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x5}, 0x4000) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000480)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") 21:14:31 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") [ 1598.876356][ T26] kauditd_printk_skb: 150 callbacks suppressed [ 1598.876372][ T26] audit: type=1400 audit(1557263671.080:29878): avc: denied { map } for pid=1041 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1598.935662][ T26] audit: type=1400 audit(1557263671.140:29879): avc: denied { map } for pid=1042 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:31 executing program 3: r0 = socket$packet(0x11, 0x2000000000002, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x3d) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x2}, 0x4) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) [ 1599.080724][ T26] audit: type=1400 audit(1557263671.170:29880): avc: denied { ioctl } for pid=1046 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1599.291910][ T26] audit: type=1400 audit(1557263671.170:29881): avc: denied { map } for pid=1042 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1599.448001][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1599.453957][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1599.469320][ T26] audit: type=1400 audit(1557263671.200:29882): avc: denied { map } for pid=1041 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1599.637731][ T26] audit: type=1400 audit(1557263671.200:29883): avc: denied { map } for pid=1041 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:31 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") [ 1599.802548][ T26] audit: type=1400 audit(1557263671.210:29884): avc: denied { map } for pid=1042 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1599.928034][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1599.933821][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1599.944696][ T26] audit: type=1400 audit(1557263671.220:29885): avc: denied { map } for pid=1042 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:32 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") [ 1600.147958][ T26] audit: type=1400 audit(1557263671.290:29886): avc: denied { map } for pid=1041 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1600.320595][ T26] audit: type=1400 audit(1557263671.320:29888): avc: denied { map } for pid=1041 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:32 executing program 1: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="16dc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="b13691cd80c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0f014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47edcfd7cfd7c652642d1fb26400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12f2400f125200111d54111d00") r1 = open(0x0, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r3 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r2, 0x0, 0x200000d) ftruncate(r1, 0x2007fff) mknod(&(0x7f0000000100)='./bus\x00', 0x80, 0x0) 21:14:33 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") 21:14:33 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_execute_func(&(0x7f0000000000)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b571112d02") [ 1601.528016][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1601.533923][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:14:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="65f34135a09d002a9140879fb900000045e1645aab784be2f9c4227d138f0e000000d483595a983a0074e10000440f1923cff2abd5c6aa3e564308c2d33ed8fb292978e2e04b4ee6632e6873117662152647dd1edd1ec4a1ad7cc6d1d1e521316cc403c57d1b07262e66420f3a0d2a4a0afd67479de00ff5f536640fc6af000000000e2d0e320010002e2e66430f1265e370000080c4bd9691c403590cbc9c0008000077c4c244b85955f26cc6466197f2a5dada430f72f3763e660f3adf1bfe746d45d907c44119e5a960eb223f0000") 21:14:34 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffff7ffffff7ffe}, 0x0, 0x8) fallocate(r0, 0x0, 0x0, 0x100000005) [ 1602.008130][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1602.014014][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:14:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/18, 0x26000, 0x1000}, 0x18) 21:14:34 executing program 3: r0 = socket$packet(0x11, 0x2000000000002, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x3d) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x2}, 0x4) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 21:14:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x28}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f964f2410f38f022c7e4c653fb0fc4014cb63a3a62a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c000000007e41a5609c8ba800000054c4e2750c9a0e000000") 21:14:35 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffff7ffffff7ffe}, 0x0, 0x8) fallocate(r0, 0x0, 0x0, 0x100000005) 21:14:35 executing program 4: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) [ 1603.608001][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1603.613845][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:14:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="65f34135a09d002a9140879fb900000045e1645aab784be2f9c4227d138f0e000000d483595a983a0074e10000440f1923cff2abd5c6aa3e564308c2d33ed8fb292978e2e04b4ee6632e6873117662152647dd1edd1ec4a1ad7cc6d1d1e521316cc403c57d1b07262e66420f3a0d2a4a0afd67479de00ff5f536640fc6af000000000e2d0e320010002e2e66430f1265e370000080c4bd9691c403590cbc9c0008000077c4c244b85955f26cc6466197f2a5dada430f72f3763e660f3adf1bfe746d45d907c44119e5a960eb223f0000") [ 1603.915517][ T26] kauditd_printk_skb: 142 callbacks suppressed [ 1603.915533][ T26] audit: type=1400 audit(1557263676.120:30030): avc: denied { map } for pid=1464 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1604.053957][ T26] audit: type=1400 audit(1557263676.120:30031): avc: denied { map } for pid=1464 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/18, 0x26000, 0x1000}, 0x18) [ 1604.217363][ T26] audit: type=1400 audit(1557263676.160:30032): avc: denied { map } for pid=1464 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:36 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffff7ffffff7ffe}, 0x0, 0x8) fallocate(r0, 0x0, 0x0, 0x100000005) [ 1604.386279][ T26] audit: type=1400 audit(1557263676.200:30033): avc: denied { map } for pid=1464 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1604.538996][ T26] audit: type=1400 audit(1557263676.210:30034): avc: denied { ioctl } for pid=1462 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1604.741468][ T26] audit: type=1400 audit(1557263676.250:30035): avc: denied { map } for pid=1464 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1604.880902][ T26] audit: type=1400 audit(1557263676.260:30036): avc: denied { map } for pid=1464 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1605.038150][ T26] audit: type=1400 audit(1557263676.290:30037): avc: denied { ioctl } for pid=1476 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:14:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/18, 0x26000, 0x1000}, 0x18) [ 1605.262955][ T26] audit: type=1400 audit(1557263676.320:30038): avc: denied { map } for pid=1464 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1605.375880][ T26] audit: type=1400 audit(1557263676.350:30039): avc: denied { ioctl } for pid=1462 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:14:37 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffff7ffffff7ffe}, 0x0, 0x8) fallocate(r0, 0x0, 0x0, 0x100000005) 21:14:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="65f34135a09d002a9140879fb900000045e1645aab784be2f9c4227d138f0e000000d483595a983a0074e10000440f1923cff2abd5c6aa3e564308c2d33ed8fb292978e2e04b4ee6632e6873117662152647dd1edd1ec4a1ad7cc6d1d1e521316cc403c57d1b07262e66420f3a0d2a4a0afd67479de00ff5f536640fc6af000000000e2d0e320010002e2e66430f1265e370000080c4bd9691c403590cbc9c0008000077c4c244b85955f26cc6466197f2a5dada430f72f3763e660f3adf1bfe746d45d907c44119e5a960eb223f0000") 21:14:37 executing program 3: r0 = socket$packet(0x11, 0x2000000000002, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x3d) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x2}, 0x4) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 21:14:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x28}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f964f2410f38f022c7e4c653fb0fc4014cb63a3a62a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c000000007e41a5609c8ba800000054c4e2750c9a0e000000") 21:14:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/18, 0x26000, 0x1000}, 0x18) 21:14:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/18, 0x26000, 0x1000}, 0x18) [ 1606.568141][ C0] net_ratelimit: 2 callbacks suppressed [ 1606.568152][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1606.579759][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:14:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/18, 0x26000, 0x1000}, 0x18) [ 1607.128033][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1607.133962][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1607.139978][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1607.145815][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:14:39 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@errors_continue='errors=continue'}]}) 21:14:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="65f34135a09d002a9140879fb900000045e1645aab784be2f9c4227d138f0e000000d483595a983a0074e10000440f1923cff2abd5c6aa3e564308c2d33ed8fb292978e2e04b4ee6632e6873117662152647dd1edd1ec4a1ad7cc6d1d1e521316cc403c57d1b07262e66420f3a0d2a4a0afd67479de00ff5f536640fc6af000000000e2d0e320010002e2e66430f1265e370000080c4bd9691c403590cbc9c0008000077c4c244b85955f26cc6466197f2a5dada430f72f3763e660f3adf1bfe746d45d907c44119e5a960eb223f0000") [ 1607.368091][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1607.373975][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:14:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/18, 0x26000, 0x1000}, 0x18) 21:14:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x28}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f964f2410f38f022c7e4c653fb0fc4014cb63a3a62a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c000000007e41a5609c8ba800000054c4e2750c9a0e000000") 21:14:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/18, 0x26000, 0x1000}, 0x18) [ 1608.280303][ T1663] REISERFS warning (device loop1): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 1608.280303][ T1663] 21:14:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/18, 0x26000, 0x1000}, 0x18) [ 1608.658085][ T1663] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 21:14:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000040)) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/18, 0x26000, 0x1000}, 0x18) 21:14:41 executing program 3: r0 = socket$packet(0x11, 0x2000000000002, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x3d) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x2}, 0x4) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 21:14:41 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@errors_continue='errors=continue'}]}) [ 1608.973691][ T26] kauditd_printk_skb: 134 callbacks suppressed [ 1608.973716][ T26] audit: type=1400 audit(1557263681.180:30174): avc: denied { map } for pid=1670 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1609.084385][ T26] audit: type=1400 audit(1557263681.230:30175): avc: denied { map } for pid=1670 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1609.142496][ T26] audit: type=1400 audit(1557263681.250:30176): avc: denied { map } for pid=1674 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x28}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f964f2410f38f022c7e4c653fb0fc4014cb63a3a62a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c000000007e41a5609c8ba800000054c4e2750c9a0e000000") 21:14:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) [ 1609.324085][ T26] audit: type=1400 audit(1557263681.260:30177): avc: denied { map } for pid=1674 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x8012, r0, 0x0) madvise(&(0x7f0000c3c000/0x2000)=nil, 0x2000, 0x1020000000c) [ 1609.530179][ T26] audit: type=1400 audit(1557263681.270:30178): avc: denied { map } for pid=1674 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1609.709097][ T26] audit: type=1400 audit(1557263681.280:30179): avc: denied { map } for pid=1674 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1609.848010][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1609.853909][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1609.854911][ T26] audit: type=1400 audit(1557263681.320:30180): avc: denied { map } for pid=1674 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1609.920458][ T1682] REISERFS warning (device loop1): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 1609.920458][ T1682] [ 1610.084598][ T26] audit: type=1400 audit(1557263681.330:30181): avc: denied { map } for pid=1674 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xe, 0x4, 0x4, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1610.281786][ T26] audit: type=1400 audit(1557263681.330:30182): avc: denied { map } for pid=1674 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:42 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@errors_continue='errors=continue'}]}) [ 1610.459149][ T26] audit: type=1400 audit(1557263681.350:30183): avc: denied { map } for pid=1674 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x8012, r0, 0x0) madvise(&(0x7f0000c3c000/0x2000)=nil, 0x2000, 0x1020000000c) 21:14:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xe, 0x4, 0x4, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 21:14:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x8012, r0, 0x0) madvise(&(0x7f0000c3c000/0x2000)=nil, 0x2000, 0x1020000000c) [ 1611.340986][ T1706] REISERFS warning (device loop1): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 1611.340986][ T1706] 21:14:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@errors_continue='errors=continue'}]}) 21:14:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xe, 0x4, 0x4, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 21:14:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x8012, r0, 0x0) madvise(&(0x7f0000c3c000/0x2000)=nil, 0x2000, 0x1020000000c) [ 1612.449772][ T1723] REISERFS warning (device loop1): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 1612.449772][ T1723] 21:14:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xe, 0x4, 0x4, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 21:14:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) [ 1613.999971][ T26] kauditd_printk_skb: 174 callbacks suppressed [ 1613.999988][ T26] audit: type=1400 audit(1557263686.210:30359): avc: denied { ioctl } for pid=1742 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1614.200616][ T26] audit: type=1400 audit(1557263686.200:30358): avc: denied { ioctl } for pid=1744 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x40000000}) [ 1614.409303][ T26] audit: type=1400 audit(1557263686.250:30360): avc: denied { map } for pid=1743 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) [ 1614.543911][ T26] audit: type=1400 audit(1557263686.270:30361): avc: denied { map } for pid=1741 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1614.689282][ T26] audit: type=1400 audit(1557263686.310:30362): avc: denied { ioctl } for pid=1745 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:14:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) [ 1614.888012][ T26] audit: type=1400 audit(1557263686.320:30363): avc: denied { map } for pid=1743 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1615.032855][ T26] audit: type=1400 audit(1557263686.320:30364): avc: denied { map } for pid=1743 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="b1369151786969ef69dc00d9d0d038c4ab5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c441c402c145490dc421fc51c12aea3374c48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394") [ 1615.268736][ T26] audit: type=1400 audit(1557263686.340:30365): avc: denied { map } for pid=1741 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) [ 1615.413401][ T26] audit: type=1400 audit(1557263686.350:30366): avc: denied { map } for pid=1741 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) 21:14:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) [ 1615.542558][ T26] audit: type=1400 audit(1557263686.380:30367): avc: denied { ioctl } for pid=1747 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:14:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0xb4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x14, 0x2, @in={0x2, 0x0, @local}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0xb4}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") 21:14:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffffffffffef5, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 21:14:48 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x0) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) writev(r0, &(0x7f0000000140), 0x3eb) 21:14:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c41730fc4223997d48f0f14e7e7018f2980dfe7df660fe7af5cc34a510804f4c441a5609c8ba800000099") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x200001) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 21:14:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000080)={0x0, 0x1}, 0x8) 21:14:49 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x4800, 0x0) tkill(r0, 0x1000000000016) 21:14:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8924, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) 21:14:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="b1369151786969ef69dc00d9d0d038c4ab5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c441c402c145490dc421fc51c12aea3374c48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394") 21:14:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000080)={0x0, 0x1}, 0x8) 21:14:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8924, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) 21:14:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000080)={0x0, 0x1}, 0x8) [ 1619.125215][ T26] kauditd_printk_skb: 163 callbacks suppressed [ 1619.125233][ T26] audit: type=1400 audit(1557263691.330:30531): avc: denied { ioctl } for pid=2020 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:14:51 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x4800, 0x0) tkill(r0, 0x1000000000016) [ 1619.288257][ T26] audit: type=1400 audit(1557263691.410:30532): avc: denied { ioctl } for pid=2020 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1619.453827][ T26] audit: type=1400 audit(1557263691.660:30533): avc: denied { ioctl } for pid=2216 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1619.667379][ T26] audit: type=1400 audit(1557263691.870:30534): avc: denied { ioctl } for pid=2227 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1619.831513][ T26] audit: type=1400 audit(1557263691.960:30535): avc: denied { map } for pid=2235 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0xb4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x14, 0x2, @in={0x2, 0x0, @local}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0xb4}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") 21:14:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8924, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) [ 1619.956177][ T26] audit: type=1400 audit(1557263691.960:30536): avc: denied { map } for pid=2235 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8924, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) 21:14:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000080)={0x0, 0x1}, 0x8) [ 1620.094128][ T26] audit: type=1400 audit(1557263691.960:30537): avc: denied { map } for pid=2235 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1620.200326][ T26] audit: type=1400 audit(1557263691.960:30538): avc: denied { map } for pid=2235 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1620.377242][ T26] audit: type=1400 audit(1557263692.060:30539): avc: denied { map } for pid=2235 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="b1369151786969ef69dc00d9d0d038c4ab5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c441c402c145490dc421fc51c12aea3374c48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394") [ 1620.530425][ T26] audit: type=1400 audit(1557263692.140:30540): avc: denied { map } for pid=2235 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:53 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x4800, 0x0) tkill(r0, 0x1000000000016) 21:14:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x140025, 0x0) 21:14:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8924, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) 21:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8924, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) 21:14:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0xb4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x14, 0x2, @in={0x2, 0x0, @local}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0xb4}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") 21:14:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8924, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) 21:14:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="b1369151786969ef69dc00d9d0d038c4ab5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c441c402c145490dc421fc51c12aea3374c48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394") 21:14:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") syz_genetlink_get_family_id$tipc2(0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, 'erspan0\x00'}) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x15, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7f}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5070}]}]}, 0x48}}, 0x0) 21:14:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x140025, 0x0) 21:14:55 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x4800, 0x0) tkill(r0, 0x1000000000016) 21:14:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x140025, 0x0) 21:14:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0xb4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x14, 0x2, @in={0x2, 0x0, @local}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0xb4}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") [ 1624.133225][ T26] kauditd_printk_skb: 170 callbacks suppressed [ 1624.133252][ T26] audit: type=1400 audit(1557263696.330:30711): avc: denied { map } for pid=2418 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x140025, 0x0) [ 1624.344966][ T26] audit: type=1400 audit(1557263696.380:30712): avc: denied { map } for pid=2414 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") syz_genetlink_get_family_id$tipc2(0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, 'erspan0\x00'}) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x15, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7f}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5070}]}]}, 0x48}}, 0x0) [ 1624.506386][ T26] audit: type=1400 audit(1557263696.380:30713): avc: denied { map } for pid=2418 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x140025, 0x0) 21:14:56 executing program 4: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x800) [ 1624.695462][ T26] audit: type=1400 audit(1557263696.390:30714): avc: denied { map } for pid=2414 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1624.848022][ T26] audit: type=1400 audit(1557263696.450:30715): avc: denied { map } for pid=2418 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1625.003573][ T26] audit: type=1400 audit(1557263696.450:30716): avc: denied { map } for pid=2418 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1625.191589][ T26] audit: type=1400 audit(1557263696.510:30717): avc: denied { map } for pid=2424 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1625.371751][ T26] audit: type=1400 audit(1557263696.550:30718): avc: denied { map } for pid=2424 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1625.532101][ T26] audit: type=1400 audit(1557263696.550:30719): avc: denied { map } for pid=2425 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x16, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x5, 0xe, 0x0, &(0x7f0000000080)="ad46ebbbff37f724ed8c00f579bf", 0x0, 0x8000}, 0x28) 21:14:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x140025, 0x0) [ 1625.710343][ T26] audit: type=1400 audit(1557263696.590:30720): avc: denied { map } for pid=2425 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:14:58 executing program 4: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x800) 21:14:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x140025, 0x0) 21:14:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x140025, 0x0) 21:14:59 executing program 4: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x800) [ 1627.290832][ T2791] option changes via remount are deprecated (pid=2678 comm=syz-executor.2) 21:14:59 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x800) 21:14:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x140025, 0x0) 21:14:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) syz_mount_image$minix(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x140025, 0x0) 21:15:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") syz_genetlink_get_family_id$tipc2(0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, 'erspan0\x00'}) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x15, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7f}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5070}]}]}, 0x48}}, 0x0) 21:15:00 executing program 2: add_key(0x0, 0x0, &(0x7f0000000100)="06a27056280cd79ec9", 0x9, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 21:15:00 executing program 4: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x800) 21:15:00 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x800) [ 1628.568458][ T2893] option changes via remount are deprecated (pid=2891 comm=syz-executor.1) 21:15:00 executing program 4: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0x3e}, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:15:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000300)="b13491cd806969ef69dc00d9c4a2d1920cec1482ab39fd5bf9e2f9b315c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2164f01c4c421fc51c1c421a571f70d2fc461a1f8a10000022121e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18e7df646736676666430fefb3000000000804f4f30f1a1254c442fd32e4111d00") 21:15:01 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x800) [ 1629.180965][ T26] kauditd_printk_skb: 172 callbacks suppressed [ 1629.180979][ T26] audit: type=1400 audit(1557263701.390:30893): avc: denied { map } for pid=2959 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1629.348254][ T26] audit: type=1400 audit(1557263701.390:30894): avc: denied { map } for pid=2959 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:01 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1629.558040][ T26] audit: type=1400 audit(1557263701.400:30895): avc: denied { map } for pid=2973 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:01 executing program 2: add_key(0x0, 0x0, &(0x7f0000000100)="06a27056280cd79ec9", 0x9, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 21:15:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") syz_genetlink_get_family_id$tipc2(0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, 'erspan0\x00'}) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x15, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x48, 0x0, 0x0, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7f}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5070}]}]}, 0x48}}, 0x0) [ 1629.716012][ T26] audit: type=1400 audit(1557263701.400:30896): avc: denied { map } for pid=2973 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:02 executing program 4: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0x3e}, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 1629.880359][ T26] audit: type=1400 audit(1557263701.400:30897): avc: denied { map } for pid=2973 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1630.027731][ T26] audit: type=1400 audit(1557263701.460:30898): avc: denied { map } for pid=2959 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1630.209164][ T26] audit: type=1400 audit(1557263701.470:30899): avc: denied { map } for pid=2973 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1630.405593][ T26] audit: type=1400 audit(1557263701.510:30900): avc: denied { map } for pid=2959 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:02 executing program 3: seccomp(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000ec0)="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") [ 1630.577852][ T26] audit: type=1400 audit(1557263701.510:30901): avc: denied { map } for pid=2959 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1630.708067][ T26] audit: type=1400 audit(1557263701.530:30902): avc: denied { map } for pid=2973 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000300)) sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) sendmsg$xdp(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000240)={0x6, {{0xa, 0x4e21, 0x2, @ipv4, 0x2}}}, 0x88) 21:15:03 executing program 4: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0x3e}, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:15:03 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x30000, 0x0) 21:15:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) 21:15:03 executing program 2: add_key(0x0, 0x0, &(0x7f0000000100)="06a27056280cd79ec9", 0x9, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 21:15:04 executing program 4: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0x3e}, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:15:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(0xffffffffffffffff, 0xc040564a, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff81"], 0x2) close(r0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000005c0)={0x0, 0xfffffffffffffffc, 0x0, 0x7fffffff, @buffer={0x0, 0x54, &(0x7f0000000280)=""/84}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0}) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/217, 0x20000259}], 0x1) 21:15:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000300)) sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) sendmsg$xdp(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000240)={0x6, {{0xa, 0x4e21, 0x2, @ipv4, 0x2}}}, 0x88) 21:15:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) 21:15:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) 21:15:05 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x30000, 0x0) 21:15:05 executing program 2: add_key(0x0, 0x0, &(0x7f0000000100)="06a27056280cd79ec9", 0x9, 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") r1 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 21:15:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) 21:15:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) [ 1634.333613][ T26] kauditd_printk_skb: 195 callbacks suppressed [ 1634.333630][ T26] audit: type=1400 audit(1557263706.540:31098): avc: denied { ioctl } for pid=3799 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000300)) sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) sendmsg$xdp(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000240)={0x6, {{0xa, 0x4e21, 0x2, @ipv4, 0x2}}}, 0x88) 21:15:06 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x30000, 0x0) [ 1634.513558][ T26] audit: type=1400 audit(1557263706.700:31099): avc: denied { ioctl } for pid=3835 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1634.719723][ T26] audit: type=1400 audit(1557263706.870:31100): avc: denied { ioctl } for pid=3835 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1634.897741][ T26] audit: type=1400 audit(1557263706.910:31101): avc: denied { ioctl } for pid=3835 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) [ 1635.082906][ T26] audit: type=1400 audit(1557263706.980:31102): avc: denied { ioctl } for pid=3871 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:07 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x30000, 0x0) 21:15:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) [ 1635.252525][ T26] audit: type=1400 audit(1557263707.080:31103): avc: denied { ioctl } for pid=3889 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1635.450034][ T26] audit: type=1400 audit(1557263707.100:31104): avc: denied { map } for pid=3913 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:07 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x30000, 0x0) 21:15:07 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x30000, 0x0) [ 1635.683009][ T26] audit: type=1400 audit(1557263707.110:31105): avc: denied { map } for pid=3913 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1635.918654][ T26] audit: type=1400 audit(1557263707.130:31106): avc: denied { map } for pid=3913 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1636.110106][ T26] audit: type=1400 audit(1557263707.130:31107): avc: denied { ioctl } for pid=3889 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000300)) sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) sendmsg$xdp(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000240)={0x6, {{0xa, 0x4e21, 0x2, @ipv4, 0x2}}}, 0x88) 21:15:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000300)) sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) sendmsg$xdp(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000240)={0x6, {{0xa, 0x4e21, 0x2, @ipv4, 0x2}}}, 0x88) 21:15:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000300)) sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) sendmsg$xdp(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000240)={0x6, {{0xa, 0x4e21, 0x2, @ipv4, 0x2}}}, 0x88) 21:15:09 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x30000, 0x0) 21:15:09 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x30000, 0x0) 21:15:09 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x30000, 0x0) 21:15:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000300)) sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) sendmsg$xdp(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000240)={0x6, {{0xa, 0x4e21, 0x2, @ipv4, 0x2}}}, 0x88) 21:15:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000300)) sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) sendmsg$xdp(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000240)={0x6, {{0xa, 0x4e21, 0x2, @ipv4, 0x2}}}, 0x88) 21:15:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 21:15:10 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x30000, 0x0) 21:15:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x8, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="6a617400000000000000000000000000000000000000000000000000000000001b000000050000005405000000000000d4040000d4040000d404000068020000b4060000b4060000b4060000b4060000b4060000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800534e4154000000000000000000000000000000000000000000000000000108000000ac14140a000000000000000000000000fe8000000000000000000000000000bbc1ff0064ff01000000000000000000000000000136fe88b82881d7997c63b7cfbb1228beff0000ffff000000ff000000ffffff0000000000000000ff00000000ffffff0065727370616e3000000000000000000073797a5f74756e000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000005c00000410000000000000000000000000000000ec0034010000000000000000000000000000000000000000000000002400686c00000000000000000000000000000000000000000000000000000000030100004800534e415400000000000000000000000000000000000000000000000000010100000000000000000000000000ffff00000000ffffffff0000000000000000000000004e20020052b5c73b335fe593d65202cec010310dfe8000000000000000000000000000aa0000000000000000000000000000000000000000000000000000000000000000626f6e64300000000000000000000000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009d020000000000ec00340100000000000000000000000000000000000000000000000024006970763668656164"], 0x1) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x3, 0x400, 0x0, 0x0, 0x0, 0x4cb]}) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000000)={0x20, 0x0, 0x8}, 0x20) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="020000000000000007"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:15:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000300)) sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) sendmsg$xdp(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000240)={0x6, {{0xa, 0x4e21, 0x2, @ipv4, 0x2}}}, 0x88) 21:15:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000300)) sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) sendmsg$xdp(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000240)={0x6, {{0xa, 0x4e21, 0x2, @ipv4, 0x2}}}, 0x88) 21:15:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\xc2(t\xf56c\xf71E\x9e\x90\xac\xa4\x19\x7f\xa1\xb8\x02x9\xff0\x7f\x94\xa7\xbeX\xd2\xed\x0e^>@\xaf\x11c\xce19\xf5\xf8\xd3\x19k\x1d\xa5\x99\x89\xb4=\x1b\xde\x88g\xf4\xadi\xef\xbe\x13\xaaU\xdc\xdcw\r\xe1 jy8\n%\xde\x86\xb8ExAkCBp\x18/\x80W.[\r\x13\xc0e\x8f9i\xc5\x95\xca\xd1\xba&?\xe65}\xe9\nl\xb4b\xa7\x9dH\"\xf3\xaa>4\xe9A$\xf9\x04\xeb\xd5\x00\xb7,\x80\x1a\xaf\xbeP\f\xec\xa8\xc1l\xbb\xe9\xc2\x01\xe7\xf4mD\x80m\xc2\xbd|\x06\b\xd2\xc9\xdb\xcb\x83\xb2\xda\xa7\xc5\xf1J\xd2\xf7i\x95\xb7\xc0\xf4nEU.\x0e\x9b\xb6\x87\x13\xd5\xa8\x7f\x16\xc3\xac\x9d,\xa24>9\xa46\x8c\x7f\x00\x00\x00\x00\x00\x00\x00\x04\xf6\x8f\x0e|\xa0|\x8aw\x87\x9f\xec\xebQ\xa2\xf4[3\xdeF\xce\xf2\xb4\xf9H@\xce8\xe4\xf8\xd3\xf0', 0x200002, 0x0) fchdir(r1) syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="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") [ 1639.339081][ T26] kauditd_printk_skb: 151 callbacks suppressed [ 1639.339099][ T26] audit: type=1400 audit(1557263711.550:31259): avc: denied { map } for pid=4468 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.489232][ T26] audit: type=1400 audit(1557263711.550:31260): avc: denied { map } for pid=4516 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.613013][ T26] audit: type=1400 audit(1557263711.550:31261): avc: denied { map } for pid=4516 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.790771][ T26] audit: type=1400 audit(1557263711.550:31262): avc: denied { map } for pid=4516 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.963812][ T26] audit: type=1400 audit(1557263711.600:31263): avc: denied { map } for pid=4468 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:12 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 21:15:12 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x800000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) write$P9_RXATTRCREATE(r2, &(0x7f0000000140)={0x383}, 0x7) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 1640.174645][ T26] audit: type=1400 audit(1557263711.630:31264): avc: denied { map } for pid=4468 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1640.373653][ T26] audit: type=1400 audit(1557263711.640:31265): avc: denied { map } for pid=4516 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1640.529548][ T26] audit: type=1400 audit(1557263711.690:31266): avc: denied { map } for pid=4516 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x3c}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1640.736937][ T26] audit: type=1400 audit(1557263711.700:31267): avc: denied { map } for pid=4516 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xab75ac3c263f0907, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:15:13 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xfffffe6a) tkill(r0, 0x401104000000016) [ 1640.983947][ T26] audit: type=1400 audit(1557263711.790:31268): avc: denied { map } for pid=4516 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000001680)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653f90fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 21:15:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000004c0)) chown(0x0, 0x0, 0x0) 21:15:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xab75ac3c263f0907, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:15:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgrp(0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, r1}) 21:15:14 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xfffffe6a) tkill(r0, 0x401104000000016) 21:15:14 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x800000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) write$P9_RXATTRCREATE(r2, &(0x7f0000000140)={0x383}, 0x7) creat(&(0x7f0000000200)='./bus\x00', 0x0) 21:15:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xab75ac3c263f0907, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:15:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgrp(0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, r1}) 21:15:15 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xfffffe6a) tkill(r0, 0x401104000000016) 21:15:15 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x800000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) write$P9_RXATTRCREATE(r2, &(0x7f0000000140)={0x383}, 0x7) creat(&(0x7f0000000200)='./bus\x00', 0x0) 21:15:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000001680)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653f90fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 21:15:15 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x800000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) write$P9_RXATTRCREATE(r2, &(0x7f0000000140)={0x383}, 0x7) creat(&(0x7f0000000200)='./bus\x00', 0x0) 21:15:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xab75ac3c263f0907, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:15:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgrp(0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, r1}) 21:15:16 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xfffffe6a) tkill(r0, 0x401104000000016) [ 1644.355066][ T26] kauditd_printk_skb: 188 callbacks suppressed [ 1644.355081][ T26] audit: type=1400 audit(1557263716.560:31457): avc: denied { map } for pid=5186 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:16 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xfffffe6a) tkill(r0, 0x401104000000016) [ 1644.553301][ T26] audit: type=1400 audit(1557263716.570:31458): avc: denied { map } for pid=5186 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000001680)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653f90fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1644.725374][ T26] audit: type=1400 audit(1557263716.590:31459): avc: denied { map } for pid=5184 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1644.889388][ T26] audit: type=1400 audit(1557263716.600:31460): avc: denied { map } for pid=5184 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgrp(0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, r1}) [ 1645.035473][ T26] audit: type=1400 audit(1557263716.620:31461): avc: denied { ioctl } for pid=5189 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:17 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xfffffe6a) tkill(r0, 0x401104000000016) [ 1645.244639][ T26] audit: type=1400 audit(1557263716.630:31462): avc: denied { ioctl } for pid=5189 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1645.371899][ T26] audit: type=1400 audit(1557263716.660:31463): avc: denied { map } for pid=5186 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:17 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x800000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) write$P9_RXATTRCREATE(r2, &(0x7f0000000140)={0x383}, 0x7) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 1645.569452][ T26] audit: type=1400 audit(1557263716.660:31464): avc: denied { map } for pid=5186 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:17 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x800000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) write$P9_RXATTRCREATE(r2, &(0x7f0000000140)={0x383}, 0x7) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 1645.680233][ T26] audit: type=1400 audit(1557263716.700:31465): avc: denied { map } for pid=5184 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1645.847289][ T26] audit: type=1400 audit(1557263716.700:31466): avc: denied { map } for pid=5184 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:18 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xfffffe6a) tkill(r0, 0x401104000000016) 21:15:18 executing program 4: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:18 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xfffffe6a) tkill(r0, 0x401104000000016) 21:15:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000001680)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653f90fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 21:15:20 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xfffffe6a) tkill(r0, 0x401104000000016) 21:15:20 executing program 4: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:20 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x800000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) write$P9_RXATTRCREATE(r2, &(0x7f0000000140)={0x383}, 0x7) creat(&(0x7f0000000200)='./bus\x00', 0x0) 21:15:20 executing program 1: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:20 executing program 2: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) [ 1649.394255][ T26] kauditd_printk_skb: 121 callbacks suppressed [ 1649.394273][ T26] audit: type=1400 audit(1557263721.600:31588): avc: denied { ioctl } for pid=5837 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:21 executing program 0: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) [ 1649.576211][ T26] audit: type=1400 audit(1557263721.780:31589): avc: denied { map } for pid=6052 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1649.694183][ T26] audit: type=1400 audit(1557263721.780:31590): avc: denied { map } for pid=6052 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:22 executing program 4: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) [ 1649.804700][ T26] audit: type=1400 audit(1557263721.780:31591): avc: denied { map } for pid=6052 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:22 executing program 1: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:22 executing program 3: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) [ 1649.922425][ T26] audit: type=1400 audit(1557263721.810:31592): avc: denied { map } for pid=6052 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:22 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xfffffe6a) tkill(r0, 0x401104000000016) [ 1650.064154][ T26] audit: type=1400 audit(1557263721.890:31593): avc: denied { ioctl } for pid=5837 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1650.242272][ T26] audit: type=1400 audit(1557263721.890:31594): avc: denied { map } for pid=6052 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1650.381478][ T26] audit: type=1400 audit(1557263721.940:31595): avc: denied { map } for pid=6052 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1650.545966][ T26] audit: type=1400 audit(1557263721.950:31596): avc: denied { ioctl } for pid=6081 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:22 executing program 2: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) [ 1650.791038][ T26] audit: type=1400 audit(1557263721.950:31597): avc: denied { map } for pid=6052 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:23 executing program 4: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:23 executing program 0: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:23 executing program 5: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:24 executing program 3: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:24 executing program 1: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:24 executing program 2: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:25 executing program 4: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:25 executing program 5: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:25 executing program 0: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:26 executing program 1: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:26 executing program 2: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) [ 1654.545100][ T26] kauditd_printk_skb: 139 callbacks suppressed [ 1654.545115][ T26] audit: type=1400 audit(1557263726.750:31737): avc: denied { ioctl } for pid=6512 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1654.749251][ T26] audit: type=1400 audit(1557263726.850:31738): avc: denied { map } for pid=6568 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1654.929254][ T26] audit: type=1400 audit(1557263726.860:31739): avc: denied { map } for pid=6568 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:27 executing program 3: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) [ 1655.075993][ T26] audit: type=1400 audit(1557263726.880:31740): avc: denied { ioctl } for pid=6544 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:27 executing program 5: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:27 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9208, 0x0) [ 1655.379139][ T26] audit: type=1400 audit(1557263726.900:31741): avc: denied { map } for pid=6568 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1655.539144][ T26] audit: type=1400 audit(1557263726.920:31742): avc: denied { map } for pid=6568 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1655.725720][ T26] audit: type=1400 audit(1557263726.940:31743): avc: denied { map } for pid=6568 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:28 executing program 1: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:28 executing program 4: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) [ 1655.913246][ T26] audit: type=1400 audit(1557263727.020:31744): avc: denied { map } for pid=6568 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1656.063044][ T26] audit: type=1400 audit(1557263727.020:31745): avc: denied { map } for pid=6568 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1656.270866][ T26] audit: type=1400 audit(1557263727.060:31746): avc: denied { ioctl } for pid=6603 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:28 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9208, 0x0) 21:15:28 executing program 2: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "4958e95a066e41e339e2fcc568fdf293c08de2f2d297fbff7e49fe1538bf2aa8"}) syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3a4d66f466f4f9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe2e430f3807b83a000000f6e7df660fe7af5cc34a510804f4c443ad609c8ba8db0000aa87aa87") 21:15:29 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9208, 0x0) 21:15:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x1c}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:15:30 executing program 1: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:30 executing program 2: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:30 executing program 4: r0 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x8, 0x80, [], 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="dbfaf9e9f6c0df83"], 0x0) listen(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x0, 0x2}) 21:15:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "4958e95a066e41e339e2fcc568fdf293c08de2f2d297fbff7e49fe1538bf2aa8"}) syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3a4d66f466f4f9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe2e430f3807b83a000000f6e7df660fe7af5cc34a510804f4c443ad609c8ba8db0000aa87aa87") 21:15:31 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9208, 0x0) [ 1659.571413][ T26] kauditd_printk_skb: 144 callbacks suppressed [ 1659.571430][ T26] audit: type=1400 audit(1557263731.780:31891): avc: denied { map } for pid=6935 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1659.767625][ T26] audit: type=1400 audit(1557263731.820:31892): avc: denied { map } for pid=6935 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1659.968002][ T26] audit: type=1400 audit(1557263732.120:31893): avc: denied { map } for pid=7010 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1660.122497][ T26] audit: type=1400 audit(1557263732.120:31894): avc: denied { map } for pid=7010 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1660.224184][ T26] audit: type=1400 audit(1557263732.230:31895): avc: denied { map } for pid=7010 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x11a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, 0x0, 0x10000) 21:15:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=@getae={0x40, 0x1f, 0xa05, 0x0, 0x0, {{@in6=@empty}, @in6=@mcast1}}, 0x40}}, 0x0) [ 1660.365849][ T26] audit: type=1400 audit(1557263732.230:31896): avc: denied { map } for pid=7010 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1660.465607][ T26] audit: type=1400 audit(1557263732.320:31897): avc: denied { ioctl } for pid=7026 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x1c}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") [ 1660.677946][ T26] audit: type=1400 audit(1557263732.330:31898): avc: denied { map } for pid=7010 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1660.858023][ T26] audit: type=1400 audit(1557263732.370:31899): avc: denied { ioctl } for pid=7026 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f0000000700), 0xdd, 0x0) 21:15:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "4958e95a066e41e339e2fcc568fdf293c08de2f2d297fbff7e49fe1538bf2aa8"}) syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3a4d66f466f4f9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe2e430f3807b83a000000f6e7df660fe7af5cc34a510804f4c443ad609c8ba8db0000aa87aa87") [ 1660.997953][ T26] audit: type=1400 audit(1557263732.390:31900): avc: denied { map } for pid=7010 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0xfffffffffffffffc, 0x5, 0xfffffffffffffffc, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000180), 0x40000000000029a, 0x0) sendmsg$key(r0, &(0x7f0000000240)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) 21:15:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=@getae={0x40, 0x1f, 0xa05, 0x0, 0x0, {{@in6=@empty}, @in6=@mcast1}}, 0x40}}, 0x0) 21:15:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x11a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, 0x0, 0x10000) 21:15:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "4958e95a066e41e339e2fcc568fdf293c08de2f2d297fbff7e49fe1538bf2aa8"}) syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3a4d66f466f4f9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe2e430f3807b83a000000f6e7df660fe7af5cc34a510804f4c443ad609c8ba8db0000aa87aa87") 21:15:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x1c}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:15:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=@getae={0x40, 0x1f, 0xa05, 0x0, 0x0, {{@in6=@empty}, @in6=@mcast1}}, 0x40}}, 0x0) 21:15:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f0000000700), 0xdd, 0x0) 21:15:35 executing program 4: mmap(&(0x7f0000600000/0x3000)=nil, 0x3000, 0x0, 0x4000044031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000ae4000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00005fe000/0x3000)=nil, 0xdfa00000}, 0x1}) 21:15:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=@getae={0x40, 0x1f, 0xa05, 0x0, 0x0, {{@in6=@empty}, @in6=@mcast1}}, 0x40}}, 0x0) [ 1664.587592][ T26] kauditd_printk_skb: 334 callbacks suppressed [ 1664.587608][ T26] audit: type=1400 audit(1557263736.790:32235): avc: denied { map } for pid=7536 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1664.996008][ T7491] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1664.996724][ T7547] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1665.004313][ T7545] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1665.017955][ T7449] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1665.024605][ T7449] audit: audit_lost=131 audit_rate_limit=0 audit_backlog_limit=64 [ 1665.040558][ T7485] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1665.046968][ T7527] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1665.047164][ T7485] audit: audit_lost=132 audit_rate_limit=0 audit_backlog_limit=64 [ 1665.055945][ T7452] audit: audit_backlog=65 > audit_backlog_limit=64 21:15:37 executing program 5: syz_execute_func(&(0x7f0000000180)="b0b691420d29d0d05a2eab5b4b4be2f9e2c7a0ed287fc100000000243a26430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccd646736676666430fefb3000000000804f44eaf151a86a72e673e0facce48510000009664660fda364a22140000008f691801ae0c000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") 21:15:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x11a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, 0x0, 0x10000) 21:15:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x1c}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:15:39 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) 21:15:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f0000000700), 0xdd, 0x0) 21:15:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) 21:15:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000580)={0x14, r2, 0xc5ac741d5035292f, 0x0, 0x0, {0x12}}, 0x14}}, 0x0) 21:15:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x11a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, 0x0, 0x10000) 21:15:40 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) 21:15:40 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) 21:15:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') preadv(r0, &(0x7f0000000700), 0xdd, 0x0) 21:15:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) [ 1669.639361][ T26] kauditd_printk_skb: 420 callbacks suppressed [ 1669.639383][ T26] audit: type=1400 audit(1557263741.850:32521): avc: denied { create } for pid=7949 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1669.841683][ T26] audit: type=1400 audit(1557263741.860:32522): avc: denied { write } for pid=7949 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 21:15:42 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1670.021970][ T26] audit: type=1400 audit(1557263741.890:32523): avc: denied { create } for pid=7949 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 21:15:42 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1670.174752][ T26] audit: type=1400 audit(1557263741.990:32524): avc: denied { ioctl } for pid=7969 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1670.453439][ T26] audit: type=1400 audit(1557263742.040:32525): avc: denied { map } for pid=7981 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) 21:15:42 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1670.697648][ T26] audit: type=1400 audit(1557263742.050:32526): avc: denied { map } for pid=7981 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:42 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1670.844033][ T26] audit: type=1400 audit(1557263742.060:32527): avc: denied { map } for pid=7981 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1671.018029][ T26] audit: type=1400 audit(1557263742.070:32528): avc: denied { map } for pid=7981 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:43 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1671.145067][ T26] audit: type=1400 audit(1557263742.080:32529): avc: denied { map } for pid=8003 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1671.281577][ T26] audit: type=1400 audit(1557263742.100:32530): avc: denied { map } for pid=8003 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) 21:15:44 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) 21:15:44 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) 21:15:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) 21:15:45 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) 21:15:45 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) 21:15:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) 21:15:46 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) 21:15:46 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1674.685255][ T26] kauditd_printk_skb: 154 callbacks suppressed [ 1674.685271][ T26] audit: type=1400 audit(1557263746.890:32685): avc: denied { map } for pid=8823 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:47 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1674.840782][ T26] audit: type=1400 audit(1557263746.940:32686): avc: denied { ioctl } for pid=8829 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:47 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1675.017264][ T26] audit: type=1400 audit(1557263746.950:32687): avc: denied { map } for pid=8823 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1675.188025][ T26] audit: type=1400 audit(1557263746.990:32688): avc: denied { map } for pid=8823 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1675.358975][ T26] audit: type=1400 audit(1557263747.040:32689): avc: denied { map } for pid=8823 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:47 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1675.554875][ T26] audit: type=1400 audit(1557263747.090:32690): avc: denied { map } for pid=8823 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1675.729114][ T26] audit: type=1400 audit(1557263747.290:32691): avc: denied { map } for pid=8932 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1675.885248][ T26] audit: type=1400 audit(1557263747.320:32692): avc: denied { map } for pid=8932 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1676.041569][ T26] audit: type=1400 audit(1557263747.340:32693): avc: denied { map } for pid=8932 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000003c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1676.257514][ T26] audit: type=1400 audit(1557263747.370:32694): avc: denied { map } for pid=8932 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:49 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) 21:15:49 executing program 0: socket$packet(0x11, 0x3, 0x300) syz_execute_func(&(0x7f0000000340)="9877774a2ae92cb81c0c0f05bf03000000c4a37bf0c55d41e2e9c422e9aabb3c000000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000d0c4efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 21:15:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x108, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x108}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") 21:15:49 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1677.848000][ C1] net_ratelimit: 2 callbacks suppressed [ 1677.848011][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1677.859575][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1677.865483][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1677.871378][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1678.088028][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1678.093961][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:15:50 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1678.488412][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1678.494736][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:15:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f964f2410f38f022c7e4c653fb0fc4014cb63a3a62a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c000000007e41a5609c8ba800000054c4e2750c9a0e000000") 21:15:51 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1678.968026][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1678.973977][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:15:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x43, 0x0, &(0x7f0000000000)) 21:15:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)="ef2435487060293c32e807ccbe97ff39fffbac229fd551c1a5b61fc8bdc56b2d9b8105fb6100b7a7aaf48ddf56af2566", 0x30}], 0x1, 0x0) syz_execute_func(&(0x7f00000003c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f480817eebce000008020080063fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833448dbd448dbd14e7e701fe5ff6e7df660fe7af5cc34a510804f4c401f882609c8b42a8002d00002d00") [ 1679.690289][ T26] kauditd_printk_skb: 133 callbacks suppressed [ 1679.690303][ T26] audit: type=1400 audit(1557263751.900:32828): avc: denied { map } for pid=9579 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x108, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x108}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") [ 1679.860456][ T26] audit: type=1400 audit(1557263751.900:32829): avc: denied { map } for pid=9520 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1680.049281][ T26] audit: type=1400 audit(1557263751.900:32830): avc: denied { map } for pid=9579 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1680.225762][ T26] audit: type=1400 audit(1557263751.900:32831): avc: denied { map } for pid=9579 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x43, 0x0, &(0x7f0000000000)) [ 1680.398234][ T26] audit: type=1400 audit(1557263751.940:32832): avc: denied { ioctl } for pid=9564 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:15:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f1c3c1207849bd070") syz_execute_func(&(0x7f0000000240)="64f34135a09d000091c4e141e0e3e004f8ab5a4be2f9440f0fa63ade00009766439a0f1b3af63af698264633c46129f44a000f181ac6c63a430a8f482ca26a32092d09670978e2d10fe47807c441bd555a7af5731176622640bd4f0c664166430fd9378fc978e2a3739400002b0f73d4abf3adc462f91ee5c443750f850000002029362b66450f8f00a4100302020fe51bc4020d16e8801b00c421a1d4bc8a000000000400c8c13c1576aac481fee6750066460f74f043ed486b0d0084c4c4c2b947f18461da545269430fba2aee8b41ca67676078462e97c4a27921fb") [ 1680.576305][ T26] audit: type=1400 audit(1557263751.950:32833): avc: denied { map } for pid=9579 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:52 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141046, 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x800100000000) [ 1680.708331][ T26] audit: type=1400 audit(1557263751.970:32834): avc: denied { map } for pid=9520 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f964f2410f38f022c7e4c653fb0fc4014cb63a3a62a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c000000007e41a5609c8ba800000054c4e2750c9a0e000000") [ 1680.879074][ T26] audit: type=1400 audit(1557263752.010:32835): avc: denied { map } for pid=9520 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1681.037079][ T26] audit: type=1400 audit(1557263752.040:32836): avc: denied { map } for pid=9579 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1681.198061][ T26] audit: type=1400 audit(1557263752.100:32837): avc: denied { map } for pid=9579 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x43, 0x0, &(0x7f0000000000)) 21:15:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x108, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x108}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") 21:15:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x43, 0x0, &(0x7f0000000000)) 21:15:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f1c3c1207849bd070") syz_execute_func(&(0x7f0000000240)="64f34135a09d000091c4e141e0e3e004f8ab5a4be2f9440f0fa63ade00009766439a0f1b3af63af698264633c46129f44a000f181ac6c63a430a8f482ca26a32092d09670978e2d10fe47807c441bd555a7af5731176622640bd4f0c664166430fd9378fc978e2a3739400002b0f73d4abf3adc462f91ee5c443750f850000002029362b66450f8f00a4100302020fe51bc4020d16e8801b00c421a1d4bc8a000000000400c8c13c1576aac481fee6750066460f74f043ed486b0d0084c4c4c2b947f18461da545269430fba2aee8b41ca67676078462e97c4a27921fb") 21:15:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f964f2410f38f022c7e4c653fb0fc4014cb63a3a62a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c000000007e41a5609c8ba800000054c4e2750c9a0e000000") 21:15:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)="ef2435487060293c32e807ccbe97ff39fffbac229fd551c1a5b61fc8bdc56b2d9b8105fb6100b7a7aaf48ddf56af2566", 0x30}], 0x1, 0x0) syz_execute_func(&(0x7f00000003c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f480817eebce000008020080063fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833448dbd448dbd14e7e701fe5ff6e7df660fe7af5cc34a510804f4c401f882609c8b42a8002d00002d00") 21:15:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f033c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) write(r1, &(0x7f0000000140)="b63db85e1e02000000000000001cf0010200606a0000d2bc7037cebc9bffff73ffffffe22c9b160096aa1fae1a00", 0x2e) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001240)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000040)="abb7f63e5512", 0x0, 0x0, 0x0, 0x0, 0x0}) 21:15:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @empty}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast1, 0x0, 0x2b}, 0x0, @in=@remote}}, 0xe8) close(r0) 21:15:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x108, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x108}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") 21:15:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f1c3c1207849bd070") syz_execute_func(&(0x7f0000000240)="64f34135a09d000091c4e141e0e3e004f8ab5a4be2f9440f0fa63ade00009766439a0f1b3af63af698264633c46129f44a000f181ac6c63a430a8f482ca26a32092d09670978e2d10fe47807c441bd555a7af5731176622640bd4f0c664166430fd9378fc978e2a3739400002b0f73d4abf3adc462f91ee5c443750f850000002029362b66450f8f00a4100302020fe51bc4020d16e8801b00c421a1d4bc8a000000000400c8c13c1576aac481fee6750066460f74f043ed486b0d0084c4c4c2b947f18461da545269430fba2aee8b41ca67676078462e97c4a27921fb") 21:15:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f964f2410f38f022c7e4c653fb0fc4014cb63a3a62a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c000000007e41a5609c8ba800000054c4e2750c9a0e000000") 21:15:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @empty}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast1, 0x0, 0x2b}, 0x0, @in=@remote}}, 0xe8) close(r0) 21:15:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)="ef2435487060293c32e807ccbe97ff39fffbac229fd551c1a5b61fc8bdc56b2d9b8105fb6100b7a7aaf48ddf56af2566", 0x30}], 0x1, 0x0) syz_execute_func(&(0x7f00000003c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f480817eebce000008020080063fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833448dbd448dbd14e7e701fe5ff6e7df660fe7af5cc34a510804f4c401f882609c8b42a8002d00002d00") [ 1684.852810][ T26] kauditd_printk_skb: 159 callbacks suppressed [ 1684.852826][ T26] audit: type=1400 audit(1557263757.060:32997): avc: denied { map } for pid=10010 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1685.043927][ T26] audit: type=1400 audit(1557263757.070:32998): avc: denied { map } for pid=10010 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f033c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) write(r1, &(0x7f0000000140)="b63db85e1e02000000000000001cf0010200606a0000d2bc7037cebc9bffff73ffffffe22c9b160096aa1fae1a00", 0x2e) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001240)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000040)="abb7f63e5512", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1685.194129][ T26] audit: type=1400 audit(1557263757.100:32999): avc: denied { map } for pid=10010 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1685.363274][ T26] audit: type=1400 audit(1557263757.110:33000): avc: denied { map } for pid=10010 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:57 executing program 1: r0 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001100070400fffd946f610500070000001f000000000004000600050004b3ff7e", 0x24}], 0x1}, 0x0) [ 1685.544889][ T26] audit: type=1400 audit(1557263757.220:33001): avc: denied { map } for pid=10010 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @empty}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast1, 0x0, 0x2b}, 0x0, @in=@remote}}, 0xe8) close(r0) [ 1685.686595][ T26] audit: type=1400 audit(1557263757.290:33002): avc: denied { map } for pid=10010 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1685.850555][ T26] audit: type=1400 audit(1557263757.290:33003): avc: denied { map } for pid=10010 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1686.025758][ T26] audit: type=1400 audit(1557263757.340:33004): avc: denied { map } for pid=10010 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f033c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) write(r1, &(0x7f0000000140)="b63db85e1e02000000000000001cf0010200606a0000d2bc7037cebc9bffff73ffffffe22c9b160096aa1fae1a00", 0x2e) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001240)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000040)="abb7f63e5512", 0x0, 0x0, 0x0, 0x0, 0x0}) 21:15:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f1c3c1207849bd070") syz_execute_func(&(0x7f0000000240)="64f34135a09d000091c4e141e0e3e004f8ab5a4be2f9440f0fa63ade00009766439a0f1b3af63af698264633c46129f44a000f181ac6c63a430a8f482ca26a32092d09670978e2d10fe47807c441bd555a7af5731176622640bd4f0c664166430fd9378fc978e2a3739400002b0f73d4abf3adc462f91ee5c443750f850000002029362b66450f8f00a4100302020fe51bc4020d16e8801b00c421a1d4bc8a000000000400c8c13c1576aac481fee6750066460f74f043ed486b0d0084c4c4c2b947f18461da545269430fba2aee8b41ca67676078462e97c4a27921fb") [ 1686.205303][ T26] audit: type=1400 audit(1557263757.350:33005): avc: denied { map } for pid=10010 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1686.332833][ T26] audit: type=1400 audit(1557263757.420:33006): avc: denied { map } for pid=10010 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:15:58 executing program 1: r0 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001100070400fffd946f610500070000001f000000000004000600050004b3ff7e", 0x24}], 0x1}, 0x0) 21:15:58 executing program 5: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @dev}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 21:15:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)="ef2435487060293c32e807ccbe97ff39fffbac229fd551c1a5b61fc8bdc56b2d9b8105fb6100b7a7aaf48ddf56af2566", 0x30}], 0x1, 0x0) syz_execute_func(&(0x7f00000003c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f480817eebce000008020080063fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833448dbd448dbd14e7e701fe5ff6e7df660fe7af5cc34a510804f4c401f882609c8b42a8002d00002d00") 21:15:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @empty}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast1, 0x0, 0x2b}, 0x0, @in=@remote}}, 0xe8) close(r0) 21:15:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f033c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) write(r1, &(0x7f0000000140)="b63db85e1e02000000000000001cf0010200606a0000d2bc7037cebc9bffff73ffffffe22c9b160096aa1fae1a00", 0x2e) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001240)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000040)="abb7f63e5512", 0x0, 0x0, 0x0, 0x0, 0x0}) 21:15:59 executing program 1: r0 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001100070400fffd946f610500070000001f000000000004000600050004b3ff7e", 0x24}], 0x1}, 0x0) 21:15:59 executing program 5: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @dev}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 21:16:00 executing program 2: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @dev}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 21:16:00 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) 21:16:00 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 21:16:00 executing program 1: r0 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001100070400fffd946f610500070000001f000000000004000600050004b3ff7e", 0x24}], 0x1}, 0x0) 21:16:00 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x0, 0x0, 0xa}) 21:16:00 executing program 5: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @dev}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 21:16:01 executing program 2: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @dev}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 21:16:01 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) 21:16:02 executing program 5: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @dev}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) 21:16:02 executing program 2: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @dev}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) [ 1689.871233][ T26] kauditd_printk_skb: 170 callbacks suppressed [ 1689.871251][ T26] audit: type=1400 audit(1557263762.080:33177): avc: denied { map } for pid=10146 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1690.128258][ T26] audit: type=1400 audit(1557263762.080:33178): avc: denied { map } for pid=10105 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:02 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) [ 1690.318793][ T26] audit: type=1400 audit(1557263762.090:33179): avc: denied { map } for pid=10105 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:02 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) 21:16:02 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) [ 1690.488392][ T26] audit: type=1400 audit(1557263762.190:33180): avc: denied { map } for pid=10146 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1690.697930][ T26] audit: type=1400 audit(1557263762.190:33181): avc: denied { map } for pid=10146 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:03 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) [ 1690.848290][ T26] audit: type=1400 audit(1557263762.240:33182): avc: denied { map } for pid=10146 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") [ 1691.115106][ T26] audit: type=1400 audit(1557263762.240:33183): avc: denied { map } for pid=10146 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1691.278004][ T26] audit: type=1400 audit(1557263762.610:33184): avc: denied { map } for pid=10396 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1691.447842][ T26] audit: type=1400 audit(1557263762.620:33185): avc: denied { map } for pid=10396 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1691.590973][ T26] audit: type=1400 audit(1557263762.640:33186): avc: denied { map } for pid=10396 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:04 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) 21:16:04 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) [ 1692.021513][T10630] Unknown ioctl 536872320 21:16:04 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) 21:16:04 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) 21:16:05 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) 21:16:05 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") 21:16:06 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) 21:16:06 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) 21:16:06 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) [ 1694.302120][T10967] Unknown ioctl 536872320 [ 1694.884135][ T26] kauditd_printk_skb: 169 callbacks suppressed [ 1694.884152][ T26] audit: type=1400 audit(1557263767.090:33356): avc: denied { map } for pid=11039 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1695.047413][ T26] audit: type=1400 audit(1557263767.090:33357): avc: denied { map } for pid=11032 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:07 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) [ 1695.231528][ T26] audit: type=1400 audit(1557263767.140:33358): avc: denied { map } for pid=11039 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:07 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80480, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000100)={0x2, 0x1, 0x4, 0x200, 0x3ff, 0x83f}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x4, 0x81000000004, 0x8000000004, 0x0, r2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video37\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000040)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000380)='user\x00', 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000340)={0x6, 0x4b, 0x0, 0x92e1, 0x5}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) [ 1695.439286][ T26] audit: type=1400 audit(1557263767.140:33359): avc: denied { map } for pid=11032 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1695.603186][ T26] audit: type=1400 audit(1557263767.140:33360): avc: denied { map } for pid=11032 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e21, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x8000000056}, 0x98) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) [ 1695.779475][ T26] audit: type=1400 audit(1557263767.160:33361): avc: denied { map } for pid=10950 comm="syz-executor.2" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=132723 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 21:16:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000260007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:16:08 executing program 0: r0 = syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000500)="0adc1f123c123f319bd070") mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) [ 1695.946288][ T26] audit: type=1400 audit(1557263767.190:33362): avc: denied { ioctl } for pid=11024 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1696.102457][ T26] audit: type=1400 audit(1557263767.190:33363): avc: denied { map_create } for pid=11024 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1696.235716][ T26] audit: type=1400 audit(1557263767.200:33364): avc: denied { map } for pid=11039 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1696.423695][ T26] audit: type=1400 audit(1557263767.210:33365): avc: denied { map } for pid=11032 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") 21:16:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000260007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:16:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e18015d1ab39fd5bf9e2f9d70f0fcab03a1cae5e090000bac7bae4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43c4a19b5da2008000000f186746f340ae65657c7c730ff0431076d523dec48179659a320000000f14e746d9f8fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:16:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x88, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x88}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d067f2412d00000000e1801c65ab39ff5bf9e2f9d7c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") 21:16:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e21, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x8000000056}, 0x98) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) 21:16:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYBLOB="cbc6cdf0bed009e2d3"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c00000000c441a5609c8ba80000005499") 21:16:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000260007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 1698.519209][T11622] Unknown ioctl 536872320 21:16:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e21, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x8000000056}, 0x98) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) 21:16:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e18015d1ab39fd5bf9e2f9d70f0fcab03a1cae5e090000bac7bae4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43c4a19b5da2008000000f186746f340ae65657c7c730ff0431076d523dec48179659a320000000f14e746d9f8fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:16:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000260007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:16:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e21, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x8000000056}, 0x98) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) [ 1699.911308][ T26] kauditd_printk_skb: 141 callbacks suppressed [ 1699.911323][ T26] audit: type=1400 audit(1557263772.120:33507): avc: denied { map } for pid=11736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.077950][ T26] audit: type=1400 audit(1557263772.120:33508): avc: denied { map } for pid=11736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.217141][ T26] audit: type=1400 audit(1557263772.180:33509): avc: denied { map } for pid=11736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.397997][ T26] audit: type=1400 audit(1557263772.190:33510): avc: denied { map } for pid=11736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x158, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x34}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x158}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1700.568074][ T26] audit: type=1400 audit(1557263772.260:33511): avc: denied { map } for pid=11736 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.716654][ T26] audit: type=1400 audit(1557263772.320:33512): avc: denied { map } for pid=11736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.836058][ T26] audit: type=1400 audit(1557263772.320:33513): avc: denied { map } for pid=11736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.958404][ T26] audit: type=1400 audit(1557263772.340:33514): avc: denied { ioctl } for pid=11755 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:16:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") 21:16:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYBLOB="cbc6cdf0bed009e2d3"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c00000000c441a5609c8ba80000005499") 21:16:13 executing program 1: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="a9ee55e6efc355b5d84579e1e0581cc25f19e348ceb89b33bd33da13f96bbe0dcc630a821b80d3d0a483a8c5f29797398c28dbc85610dbb0af30258f767edff6d7b5a45e8ffa59734a1a82f440b46595ea85a27c19429df8ac14fd8c", 0x5c, 0xfffffffffffffff9) keyctl$update(0x2, r0, &(0x7f00000004c0)="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", 0x6f5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r2 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000100)=0x7, 0x4) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000240)=ANY=[], 0x0, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffb) 21:16:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x88, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x88}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d067f2412d00000000e1801c65ab39ff5bf9e2f9d7c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") [ 1701.099499][ T26] audit: type=1400 audit(1557263772.390:33515): avc: denied { map } for pid=11736 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e18015d1ab39fd5bf9e2f9d70f0fcab03a1cae5e090000bac7bae4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43c4a19b5da2008000000f186746f340ae65657c7c730ff0431076d523dec48179659a320000000f14e746d9f8fe5ff6e7df0804f4c441a5609c8ba80000005499") [ 1701.248098][ T26] audit: type=1400 audit(1557263772.390:33516): avc: denied { map } for pid=11736 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1701.665819][T11854] Unknown ioctl 536872320 21:16:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x158, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x34}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x158}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 21:16:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYBLOB="cbc6cdf0bed009e2d3"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c00000000c441a5609c8ba80000005499") 21:16:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)={0x78, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x5}, 0x4000) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000480)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") 21:16:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x88, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x88}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d067f2412d00000000e1801c65ab39ff5bf9e2f9d7c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") 21:16:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e18015d1ab39fd5bf9e2f9d70f0fcab03a1cae5e090000bac7bae4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43c4a19b5da2008000000f186746f340ae65657c7c730ff0431076d523dec48179659a320000000f14e746d9f8fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:16:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="1c12b5b598cd80f56962f5696200d9460f2df017795bf9f2680c0000008fe9589b26c7e4c753fbc4edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 21:16:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x158, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x34}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x158}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 21:16:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)={0x78, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x5}, 0x4000) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000480)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") 21:16:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYBLOB="cbc6cdf0bed009e2d3"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c00000000c441a5609c8ba80000005499") 21:16:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x88, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x88}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d067f2412d00000000e1801c65ab39ff5bf9e2f9d7c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") 21:16:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)={0x2, 0x0, 0x0, 0x0, 0x14d, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x14b, 0x18, 0x0, 0x0, 0xa49, "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"}]}, 0xa68}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") [ 1704.979139][ T26] kauditd_printk_skb: 132 callbacks suppressed [ 1704.979155][ T26] audit: type=1400 audit(1557263777.190:33649): avc: denied { map } for pid=12066 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:17 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) [ 1705.134464][ T26] audit: type=1400 audit(1557263777.220:33650): avc: denied { map } for pid=12066 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.257789][ T26] audit: type=1400 audit(1557263777.230:33651): avc: denied { map } for pid=12066 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.416898][ T26] audit: type=1400 audit(1557263777.230:33652): avc: denied { map } for pid=12066 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.617972][ T26] audit: type=1400 audit(1557263777.310:33653): avc: denied { map } for pid=12066 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.778386][ T26] audit: type=1400 audit(1557263777.330:33654): avc: denied { map } for pid=12085 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x158, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x34}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x158}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1705.949773][ T26] audit: type=1400 audit(1557263777.330:33655): avc: denied { map } for pid=12085 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1706.099796][ T26] audit: type=1400 audit(1557263777.370:33656): avc: denied { map } for pid=12066 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1706.259094][ T26] audit: type=1400 audit(1557263777.380:33657): avc: denied { map } for pid=12066 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)={0x78, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x5}, 0x4000) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000480)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") 21:16:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000004c0)=""/72) [ 1706.437247][ T26] audit: type=1400 audit(1557263777.380:33658): avc: denied { map } for pid=12085 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)={0x2, 0x0, 0x0, 0x0, 0x14d, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x14b, 0x18, 0x0, 0x0, 0xa49, "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"}]}, 0xa68}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") 21:16:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") semctl$IPC_RMID(0x0, 0x0, 0x10) 21:16:20 executing program 4: prctl$PR_MCE_KILL(0x35, 0x1, 0x2) 21:16:20 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) 21:16:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)={0x78, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x5}, 0x4000) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000480)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") 21:16:20 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) 21:16:21 executing program 4: prctl$PR_MCE_KILL(0x35, 0x1, 0x2) 21:16:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)={0x2, 0x0, 0x0, 0x0, 0x14d, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x14b, 0x18, 0x0, 0x0, 0xa49, "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"}]}, 0xa68}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") 21:16:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") semctl$IPC_RMID(0x0, 0x0, 0x10) 21:16:22 executing program 4: prctl$PR_MCE_KILL(0x35, 0x1, 0x2) 21:16:22 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) [ 1710.018010][ T26] kauditd_printk_skb: 152 callbacks suppressed [ 1710.018027][ T26] audit: type=1400 audit(1557263782.220:33811): avc: denied { map } for pid=12631 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:22 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) 21:16:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1710.199925][ T26] audit: type=1400 audit(1557263782.230:33812): avc: denied { map } for pid=12736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1710.340324][ T26] audit: type=1400 audit(1557263782.230:33813): avc: denied { map } for pid=12736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:22 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) [ 1710.504833][ T26] audit: type=1400 audit(1557263782.230:33814): avc: denied { map } for pid=12631 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1710.658434][ T26] audit: type=1400 audit(1557263782.230:33815): avc: denied { map } for pid=12736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)={0x2, 0x0, 0x0, 0x0, 0x14d, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x14b, 0x18, 0x0, 0x0, 0xa49, "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"}]}, 0xa68}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") [ 1710.798023][ T26] audit: type=1400 audit(1557263782.260:33816): avc: denied { ioctl } for pid=12732 comm="syz-executor.3" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:16:23 executing program 4: prctl$PR_MCE_KILL(0x35, 0x1, 0x2) [ 1710.974766][ T26] audit: type=1400 audit(1557263782.260:33817): avc: denied { map } for pid=12736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1711.207280][ T26] audit: type=1400 audit(1557263782.330:33818): avc: denied { map } for pid=12736 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1711.398568][ T26] audit: type=1400 audit(1557263782.380:33819): avc: denied { map } for pid=12736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1711.582930][ T26] audit: type=1400 audit(1557263782.400:33820): avc: denied { map } for pid=12736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:24 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) 21:16:24 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) 21:16:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000580)=@polexpire={0xcc, 0x1b, 0x321, 0x0, 0x0, {{{@in=@empty, @in=@multicast2}}}, [@mark={0xc}]}, 0xcc}}, 0x0) 21:16:25 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) 21:16:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0bdc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="2800000000000000000000000700000044180f03008cbf36c4553eb9cbd97f58f874a2b4d9e69000"], 0x28}, 0x0) 21:16:25 executing program 3: shmat(0x0, &(0x7f0000001000/0x1000)=nil, 0x6000) msync(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x4) 21:16:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) 21:16:26 executing program 2: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net\x00\xab\xd4\xf0\xdd\xa4\xf5\x7f\xd0\x97\xe1\x01T\xb7s\x1a\xba\xacfK\xed\xa4\x01bG\xc5q\xaa\xfa\xe8\r\x00\tu\xbc\x8em!\xdau\xf1;\xd7\x8a\x9a\xbfJ$ 0\x17\x9a\v\xc6\xf3m\x9d\xfa\xc9\xcalo\xa6') getdents(r0, &(0x7f0000000400)=""/180, 0x414) getdents(r0, &(0x7f0000000ea9)=""/407, 0x197) 21:16:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") syz_genetlink_get_family_id$tipc2(0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 21:16:27 executing program 3: shmat(0x0, &(0x7f0000001000/0x1000)=nil, 0x6000) msync(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x4) [ 1715.028666][ T26] kauditd_printk_skb: 353 callbacks suppressed [ 1715.028692][ T26] audit: type=1400 audit(1557263787.240:34175): avc: denied { map } for pid=13220 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:27 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) [ 1715.358033][ T26] audit: type=1400 audit(1557263787.240:34177): avc: denied { map } for pid=13210 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1715.463443][T13235] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1715.470000][T13210] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1715.470013][T13210] audit: audit_lost=179 audit_rate_limit=0 audit_backlog_limit=64 [ 1715.470022][T13210] audit: backlog limit exceeded [ 1715.480073][T13220] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1715.500933][T13233] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1715.501723][T13266] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1715.507472][T13233] audit: audit_lost=180 audit_rate_limit=0 audit_backlog_limit=64 21:16:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x3, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 21:16:28 executing program 2: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)={0x9, 0x20000000001, "f6"}, 0x121001) 21:16:28 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000040)={0x1}) 21:16:28 executing program 3: shmat(0x0, &(0x7f0000001000/0x1000)=nil, 0x6000) msync(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x4) 21:16:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x3, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 21:16:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x3, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 21:16:29 executing program 2: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)={0x9, 0x20000000001, "f6"}, 0x121001) 21:16:30 executing program 3: shmat(0x0, &(0x7f0000001000/0x1000)=nil, 0x6000) msync(&(0x7f000000e000/0x4000)=nil, 0x4000, 0x4) 21:16:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x13, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) 21:16:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = dup(r1) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000fffffffb) 21:16:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x3, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 21:16:31 executing program 2: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)={0x9, 0x20000000001, "f6"}, 0x121001) 21:16:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x3, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 21:16:31 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x25d) r0 = socket$inet6_sctp(0xa, 0x4000000000005, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x84, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x9b) 21:16:32 executing program 2: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)={0x9, 0x20000000001, "f6"}, 0x121001) 21:16:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x3, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 21:16:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x3, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) [ 1720.232457][ T26] kauditd_printk_skb: 350 callbacks suppressed [ 1720.232475][ T26] audit: type=1400 audit(1557263792.440:34483): avc: denied { ioctl } for pid=13616 comm="syz-executor.3" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:16:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x28}}, 0x0) syz_execute_func(&(0x7f0000000380)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d3ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fe0f8028ffffffab64e4660f38323c8fa1fe5ff6f6df0804f4c49ef8f840fc9c0f01c4288ba6452e00001ebdd4083644d923") [ 1720.714679][ T26] audit: type=1400 audit(1557263792.920:34484): avc: denied { map } for pid=13745 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1720.817244][ T26] audit: type=1400 audit(1557263792.950:34485): avc: denied { ioctl } for pid=13742 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:16:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) r1 = memfd_create(&(0x7f0000000040)='.}\x00', 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000fffffffb) 21:16:33 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 21:16:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000001c008109e00f80ecdb4cb9f207c804a00d000000880362fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) [ 1720.991470][ T26] audit: type=1400 audit(1557263792.950:34486): avc: denied { map } for pid=13745 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) [ 1721.190706][ T26] audit: type=1400 audit(1557263792.960:34487): avc: denied { map } for pid=13745 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:33 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x25d) r0 = socket$inet6_sctp(0xa, 0x4000000000005, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x84, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x9b) [ 1721.358848][ T26] audit: type=1400 audit(1557263792.960:34488): avc: denied { map } for pid=13745 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1721.500059][ T26] audit: type=1400 audit(1557263793.010:34490): avc: denied { map } for pid=13745 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1721.657361][ T26] audit: type=1400 audit(1557263793.010:34489): avc: denied { ioctl } for pid=13756 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1721.866616][ T26] audit: type=1400 audit(1557263793.020:34491): avc: denied { map } for pid=13745 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1721.966236][T13874] __nla_parse: 2 callbacks suppressed [ 1721.966256][T13874] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 21:16:34 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x25d) r0 = socket$inet6_sctp(0xa, 0x4000000000005, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x84, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x9b) [ 1722.057400][ T26] audit: type=1400 audit(1557263793.020:34492): avc: denied { map } for pid=13745 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 21:16:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000001c008109e00f80ecdb4cb9f207c804a00d000000880362fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 21:16:35 executing program 5: add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 1723.039791][T13961] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 21:16:35 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x25d) r0 = socket$inet6_sctp(0xa, 0x4000000000005, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x84, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x9b) 21:16:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) [ 1723.360676][T13873] overlayfs: filesystem on './file0' not supported as upperdir 21:16:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x28}}, 0x0) syz_execute_func(&(0x7f0000000380)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d3ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fe0f8028ffffffab64e4660f38323c8fa1fe5ff6f6df0804f4c49ef8f840fc9c0f01c4288ba6452e00001ebdd4083644d923") 21:16:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000001c008109e00f80ecdb4cb9f207c804a00d000000880362fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 21:16:35 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') [ 1724.124420][T14020] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 21:16:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000001c008109e00f80ecdb4cb9f207c804a00d000000880362fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 21:16:36 executing program 5: add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 21:16:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 21:16:37 executing program 3: add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 1725.247438][ T26] kauditd_printk_skb: 128 callbacks suppressed [ 1725.247452][ T26] audit: type=1400 audit(1557263797.450:34621): avc: denied { map } for pid=14118 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x28}}, 0x0) syz_execute_func(&(0x7f0000000380)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d3ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fe0f8028ffffffab64e4660f38323c8fa1fe5ff6f6df0804f4c49ef8f840fc9c0f01c4288ba6452e00001ebdd4083644d923") [ 1725.399873][T14125] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1725.409261][ T26] audit: type=1400 audit(1557263797.450:34622): avc: denied { ioctl } for pid=14115 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1725.615276][ T26] audit: type=1400 audit(1557263797.490:34623): avc: denied { ioctl } for pid=14114 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:16:37 executing program 5: add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 21:16:38 executing program 1: add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 1725.880302][ T26] audit: type=1400 audit(1557263797.510:34624): avc: denied { map } for pid=14118 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1726.040179][ T26] audit: type=1400 audit(1557263797.510:34625): avc: denied { map } for pid=14118 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:38 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') [ 1726.247032][ T26] audit: type=1400 audit(1557263797.510:34626): avc: denied { map } for pid=14118 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1726.421890][ T26] audit: type=1400 audit(1557263797.520:34627): avc: denied { map } for pid=14107 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1726.601778][ T26] audit: type=1400 audit(1557263797.530:34628): avc: denied { map } for pid=14107 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1726.765375][ T26] audit: type=1400 audit(1557263797.560:34629): avc: denied { map } for pid=14118 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1726.920982][ T26] audit: type=1400 audit(1557263797.570:34630): avc: denied { ioctl } for pid=14119 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:16:39 executing program 5: add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 21:16:39 executing program 3: add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 21:16:39 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 21:16:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x28}}, 0x0) syz_execute_func(&(0x7f0000000380)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d3ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fe0f8028ffffffab64e4660f38323c8fa1fe5ff6f6df0804f4c49ef8f840fc9c0f01c4288ba6452e00001ebdd4083644d923") 21:16:39 executing program 1: add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 21:16:40 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 21:16:41 executing program 3: add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 21:16:41 executing program 1: add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 21:16:41 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 21:16:41 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 21:16:42 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="10bef0df7c62b74748f9f9a8d7119ec2fccba5924e8f8c1059eb9e21def36ddc0f752352a606200e5d4a4aaafb0aca718550276521ea06f345cafd868acccb188711adbb9786576421a9d6a7f88cf5dde5f6725a83c156a6427932347ee30d3e6ea61683fb200416518c000dadabc5214fadb835cccb1e63005632525f4ef308d7157d59157df0f1516b78bea6ba56a937ca23d2e4594005a77deed6604eed32560c36c7121f94c50ab78289c14b701993722482a4afced2eefdee7db5590074279e756fd49fb3f9e80e47462f96410d063ef47a3649a39b2f73ab1fd6400001a883787c622eb24a6ebc9bb947214a94d2c28091f79f55102224d14ba702f1ede7ee19bcbafc3c35d5466383fc3676b6b19a443c9c946fa92be4c423a201d379f0b9d896065e42cc7bdb6c7650f2e4486b9380af9cffb4aefa1ff34b36d54159cb533b61c3c432bb36583ae7d6442e0fc3d883ab901533b2dc996fa0f3790938302b7054cb0ff431a7b92bbc887ebf4e8738368fd4205e86dab2678085fcf2baa789a90f735431f84e40027a047fab84cbcf36fc5457a51853cedab2f83d41fd7262cecc3745500d967951a5fd6cc2b1a7eee0f3ae946383ab2d262165015efad87dc15308b956fdfb1bc4e1b941b791202203543f3911479f5f36f320786c839887e848e6baf87d90760d4123226276b1cc08b2d17f5315d8b0b31012ad78a479cd9fb94c21855cced8c84e49c0e1daa96cecd2e8b7f5b96f4c85075fd8107786cd6327b965d5d631a97965be09494c1642baa00e8c3c9d72e98a8ceca1879137f1aacb9a44190c768da39f9892aca5864a24a9082ba89a08f17985b488dc3fcdb4b8000e485c7bacd64147b1923c0503d5bebee4571f4d1c45da09b0f65acfc4ab8adc95f52fbbd1245c638b4f6d780aceeecaf9794777c24cc68d46d0983296798ace82abbbc7c12976d33fee1a26f4e5bc518d8deb9386c8aecf880bab3157bd72db14b2aab40fab3bd3cd2a23ada891b38e1e271d56532e6d242fad498fa79d7b19d2302b63b2181dddad7721a34dbc5acda126c0a0fa7e4d6d901054b883e7941bd165445dcc5b39755c83c60b179d5043681bf47359bd567da74a3408791edbc1729cb1ddc7b792b59da1e617b57b4899715c000449ddc94fa6be0af1d08fbe1dcfc0d7ab5a0da3d2ae36355953b783a26bf0543c3148d84aa2898094949f06dfa544607ee16b7576bb2b3e8eda12f155957ef1885f71f9e448850b2cbfdb6cc41c26239b2988bb2bfc953fc563455a26dc4aa32adbc46f9239cca939cc4630b28f2c357ecffd349cd275e05c0b19251be3b65e986031ca694c48274b52643a876081bf924cb285364d485933698d4c47fc72398466772cc0d0c0e5ca3651a026e3501f6c9656a872a3db31155ede9acf7077487f318dcb161aef7593061c889212f23456194c244ad952c1fba763da42af34e9ef8bf27d9f76ba7d9f89d8f058fdbe19ef8e1d9e0fbf5fdc552b7c731afa83e3503dfeaab32d0a247e9f9ec32e5369da917b571eec720834bbbed9428f9c23d5b05b0d1eb58026daaf27f270d0c3f04c2314f997220b836329018072ef969afdd0ca6772d44ecca2c55b3d39aaba6a552331d9d7b7ed92d2226e797c7a5159c49685b415a8cc842676b70e10f46bf6571ab77e640725e6722f84f0ef38dd37c73d6f4982e824aeb5ae10c41a33633f310a6fa1787bfb884e2a2010221edf80cfdbd827bc352da8171edef36ae23c2c2d0aa9c3dab70f3e39f099251b9aa02ac7e2b95ce4ef423b0ec88ee8ac1d7a2c3e0aa8a7600b0534156979c26e151ffd86ba1ec81cac55858319b9193feff55ae9f89bc6c64ac99a6726303c660f7f1b156d1dfc41cebc09ee84f2a696454a26e795695bdb582a4eae723af96b6555140ad410c9c4aefdc7c0b7a352f513f5e080a20b95837b394732f24d7735d9ecb764a5e06a773f6c3f8cdc48dc42e48b4778c5875d1c107534e45840a4d7ab07bb6f9e00fa297d76f883a3b22c964c3a29041fa42886c3de02de792e3ab07be4c032886390c90790a57b06cf8acf957d3db6a8a8e4bf3e13633c8fc00119afb154c8917c6985c10107b40e058dd53f45031cf8649452b9ca6c6d7b63381a472de05609ce18561484b9770536c9d7aac7d5a997dfedf9b665239819e2b40490d3d9c59e3b7211ac542c7f68ceb34acf96de90d36da3ff6af5afb8eca706603b612edf506fc786960aaf659e77d16349609e88acc3c56ee5a9ee1e4c628d7506bc93a518233572f547a0e2b48fc28b7d57896a242134139e00bec3681a7e94a448decf0b958834fa35b7e6bcca3ecf339805a6f2c37e7a379e4894b759bbf63c686f98b6c33211491a9ab383f603d22b14e14cebf61ee79b85aab3417df4bc326f10d95f2dc3de06eab9b1056b9f0b736c31e34782fab2d48af4cf7c87417a66307a0e810f1ab90e0bb52998cdfaabd4190678f96b53207353d42a2387820727980999a2ac793c1e3df0e32589732d863e84fa0e87321f7bfaf6e8fbf62602b4e28e1318e162d51e651ad1a8defce767d005e33440b3ee0d35a356a078f1d1295065ba69fa29d82c120dcd96e012e99d678f3888134a7f96d544a0fec3936c047428814109a8b4b120b8b6ad350faaf033fb9d4dc08340782a5d095b77fdd8ab7bde4488ec3de1692384d87c815a6d89ff32d76bd15bd2fe949ddd17f8314d4f4fad72c4ef044d37408dcc875eef0141624f0502129f8a3c98c90cee7d6168273f1fb65db4bacde462466157937208b112efb2e4f4b03e174d1dabfe7da178f72bd0d6c4b2f93a1f1417d01758c92606aea94095de2b2b2f42ef0d693da5a5b38f89a578f494d0976bd677dc501ece42509c293eca333d1b201c69116039ef1146700c5d9e5139b02175fdb886c6bc7ff29936bbfda0a1e982a2aa92aaf7ab99bc98975f9dc574f014eab15c2d4e30162c6c5d1efe4ce2a399808831cffb59167dbe9806a0695e034f4c49d7c89a3e34da1dc0602f025e1ad5b8d19961399f7ec9f899d9c0d22f94a4aac5d80ec1cc6e8a0cb1b12beba7d619dc717f83e295cfb8de82463257f2ddadf93b55e95c7aaeeed75a36895ee9f6255fda2e15d3f6bed4086828378495d1dc7a7d9bb109dec0b1aa43d791c859cea325ae7cd528165190e2fb476d29aa73ce34d9763c4cd511fdd2c39a432c31d967a9cf2ad34f068e75465f04c7f07546c9f673036d0fd1ba94dc749c97dc3056411e18f4d10d513d522afc5601a93927d5d121d5b06bad5b4229b88e585125c4a4f0f184f9012cecfa001a46d6b6afad9eab3b778c56cbc5a0349202b3be39c8c43e0d38de3475c920c60e0a983a6a20947ca511a4fc81979b78cc2039c0e558fa384840feca4f21c2ed36a1c30520c334a661b09549a16f83ad2cda8cafdf6537fb4b3ec9e0eb1cd44475abdb0417bae3e67352926c7ffd5ef0669591b2edc7224ef8ffe85560efd66f1963de3e0f0aaedc0c103dbfc429b9725629ab77fdc02ee6d5f49989b55a9ef5322f1573317d527ba230d742b21583674dcca240273e11ab4bd1a78a9b24bf6f96b29e9063716633312d1ad49169dd7a4871a4522c0d0fd6e4f164d63710d94b39295664c0939ca375ac66d9be642d040ff10640c0874480d09e772963d82b19ee6a8892703adc75084a4e1f07da953a96f97101e5f19dac14781c31095a4f46ad86968355a49e3b1b5e57ac77c6664904d93dd5568b3cfe8e054b940ec708a8d66b71737007cef7f0ce06ba4941baf9a8334265eea266de380ba741e25d081a0dc9a0019ff34fe858788cf9f61889316374f8bda7b13a6b17424dec83fcbcf7f707ffefb63d136b25c19927893a0d97d048653d59e5c380756e49dd3d8e21534b16fbdb0ba16af3bee4b666f83f664fa75e1bbd494b59c3fb25126c126af405ad8024951ed5384c00342e213889fb19a62010888789d0406246011093667145a380f6392308878d7295fb4396e8ba1d23cbf1b03263b94b204bd47d2b4e46284c7c1ab0b38fbc1ef60deb4c3b60abeeb33197b96bd7e3ab9fdc9954ae7d21f53f5ee9e648afe711b08287edec9e37c3e24462c7d996c2b730ec6ba8eac9f0629f068277fd2b5d5ed33e71f8f051f1c1372ebc973814f8bf7ceacf33a74441d53f7feaf1128d4ea156c562720683929a1cc088d9ca63325c2137ad02c317de983cfbaf63de3b2ddf7dbc3fcf841e74881830c8e448b0755cac238be8484c284338944d86018d8b25300ab7eb4dc13b4e2dd8c5da40439db53287c4a182cc84dcfb826233772d31cd168d91916a715b5b9b3f32125c4023314be98a8e110ff9157c855f20933565dd50a006c53a4cd8c76e4ef7f3f952ee5d820b1fb09d34deed4c383e232d85df5b7bf78e8793aeb594f5eebc41efc53b08ef9e978770fad042a152c1fa2bd20b15d9b9b12abd8bf86a67e3b016f35885cc021558bffec6e971ed39a9235a763a386397c62a0c17ce0053a64643ff42ac2dfd4a68d4d11b6bdf2bbfc12cd1148a000aca0ad70e3c7ed7ceb181d0e3af39621973f76bcd55c93f21b344dd7d689f4dbb78e424c82960e37179d105ee1a39bbe5c8514d978dc64bf389a438eb17a7652ab2ddd52a0245d1777bf93c29676cc431d84b9a4855db4918cdda65ce8f2cf52ebe81bbb90cfee850f3400ae4b298490f647a158e266852629a2fe94f70ac49f2e51014c91ea6c95de2c2b80557b6da4b9a7e43535ba023dd6a2a03956446ad42387117f00484854b68f6886e8649db818d64a0f287b463151983db1628123b3d1ec0d0116c137662b2db4883fb136e5bdaca44902fd19bea5e1cd41e7be5f761fd59eea8b9e30c3cdee9dc8713c15a843814f17852401a7c6e57fad2bb60a33be897a3347d0a1e11c3792d04b5c029dca31fb8543032bd35b897c97fcac0e9e4a060e3090519ab84847a1e74401fcf392620") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') [ 1730.270224][ T26] kauditd_printk_skb: 131 callbacks suppressed [ 1730.270241][ T26] audit: type=1400 audit(1557263802.480:34762): avc: denied { map } for pid=14643 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1730.393059][ T26] audit: type=1400 audit(1557263802.510:34763): avc: denied { map } for pid=14643 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1730.530311][ T26] audit: type=1400 audit(1557263802.520:34764): avc: denied { map } for pid=14643 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:42 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="10bef0df7c62b74748f9f9a8d7119ec2fccba5924e8f8c1059eb9e21def36ddc0f752352a606200e5d4a4aaafb0aca718550276521ea06f345cafd868acccb188711adbb9786576421a9d6a7f88cf5dde5f6725a83c156a6427932347ee30d3e6ea61683fb200416518c000dadabc5214fadb835cccb1e63005632525f4ef308d7157d59157df0f1516b78bea6ba56a937ca23d2e4594005a77deed6604eed32560c36c7121f94c50ab78289c14b701993722482a4afced2eefdee7db5590074279e756fd49fb3f9e80e47462f96410d063ef47a3649a39b2f73ab1fd6400001a883787c622eb24a6ebc9bb947214a94d2c28091f79f55102224d14ba702f1ede7ee19bcbafc3c35d5466383fc3676b6b19a443c9c946fa92be4c423a201d379f0b9d896065e42cc7bdb6c7650f2e4486b9380af9cffb4aefa1ff34b36d54159cb533b61c3c432bb36583ae7d6442e0fc3d883ab901533b2dc996fa0f3790938302b7054cb0ff431a7b92bbc887ebf4e8738368fd4205e86dab2678085fcf2baa789a90f735431f84e40027a047fab84cbcf36fc5457a51853cedab2f83d41fd7262cecc3745500d967951a5fd6cc2b1a7eee0f3ae946383ab2d262165015efad87dc15308b956fdfb1bc4e1b941b791202203543f3911479f5f36f320786c839887e848e6baf87d90760d4123226276b1cc08b2d17f5315d8b0b31012ad78a479cd9fb94c21855cced8c84e49c0e1daa96cecd2e8b7f5b96f4c85075fd8107786cd6327b965d5d631a97965be09494c1642baa00e8c3c9d72e98a8ceca1879137f1aacb9a44190c768da39f9892aca5864a24a9082ba89a08f17985b488dc3fcdb4b8000e485c7bacd64147b1923c0503d5bebee4571f4d1c45da09b0f65acfc4ab8adc95f52fbbd1245c638b4f6d780aceeecaf9794777c24cc68d46d0983296798ace82abbbc7c12976d33fee1a26f4e5bc518d8deb9386c8aecf880bab3157bd72db14b2aab40fab3bd3cd2a23ada891b38e1e271d56532e6d242fad498fa79d7b19d2302b63b2181dddad7721a34dbc5acda126c0a0fa7e4d6d901054b883e7941bd165445dcc5b39755c83c60b179d5043681bf47359bd567da74a3408791edbc1729cb1ddc7b792b59da1e617b57b4899715c000449ddc94fa6be0af1d08fbe1dcfc0d7ab5a0da3d2ae36355953b783a26bf0543c3148d84aa2898094949f06dfa544607ee16b7576bb2b3e8eda12f155957ef1885f71f9e448850b2cbfdb6cc41c26239b2988bb2bfc953fc563455a26dc4aa32adbc46f9239cca939cc4630b28f2c357ecffd349cd275e05c0b19251be3b65e986031ca694c48274b52643a876081bf924cb285364d485933698d4c47fc72398466772cc0d0c0e5ca3651a026e3501f6c9656a872a3db31155ede9acf7077487f318dcb161aef7593061c889212f23456194c244ad952c1fba763da42af34e9ef8bf27d9f76ba7d9f89d8f058fdbe19ef8e1d9e0fbf5fdc552b7c731afa83e3503dfeaab32d0a247e9f9ec32e5369da917b571eec720834bbbed9428f9c23d5b05b0d1eb58026daaf27f270d0c3f04c2314f997220b836329018072ef969afdd0ca6772d44ecca2c55b3d39aaba6a552331d9d7b7ed92d2226e797c7a5159c49685b415a8cc842676b70e10f46bf6571ab77e640725e6722f84f0ef38dd37c73d6f4982e824aeb5ae10c41a33633f310a6fa1787bfb884e2a2010221edf80cfdbd827bc352da8171edef36ae23c2c2d0aa9c3dab70f3e39f099251b9aa02ac7e2b95ce4ef423b0ec88ee8ac1d7a2c3e0aa8a7600b0534156979c26e151ffd86ba1ec81cac55858319b9193feff55ae9f89bc6c64ac99a6726303c660f7f1b156d1dfc41cebc09ee84f2a696454a26e795695bdb582a4eae723af96b6555140ad410c9c4aefdc7c0b7a352f513f5e080a20b95837b394732f24d7735d9ecb764a5e06a773f6c3f8cdc48dc42e48b4778c5875d1c107534e45840a4d7ab07bb6f9e00fa297d76f883a3b22c964c3a29041fa42886c3de02de792e3ab07be4c032886390c90790a57b06cf8acf957d3db6a8a8e4bf3e13633c8fc00119afb154c8917c6985c10107b40e058dd53f45031cf8649452b9ca6c6d7b63381a472de05609ce18561484b9770536c9d7aac7d5a997dfedf9b665239819e2b40490d3d9c59e3b7211ac542c7f68ceb34acf96de90d36da3ff6af5afb8eca706603b612edf506fc786960aaf659e77d16349609e88acc3c56ee5a9ee1e4c628d7506bc93a518233572f547a0e2b48fc28b7d57896a242134139e00bec3681a7e94a448decf0b958834fa35b7e6bcca3ecf339805a6f2c37e7a379e4894b759bbf63c686f98b6c33211491a9ab383f603d22b14e14cebf61ee79b85aab3417df4bc326f10d95f2dc3de06eab9b1056b9f0b736c31e34782fab2d48af4cf7c87417a66307a0e810f1ab90e0bb52998cdfaabd4190678f96b53207353d42a2387820727980999a2ac793c1e3df0e32589732d863e84fa0e87321f7bfaf6e8fbf62602b4e28e1318e162d51e651ad1a8defce767d005e33440b3ee0d35a356a078f1d1295065ba69fa29d82c120dcd96e012e99d678f3888134a7f96d544a0fec3936c047428814109a8b4b120b8b6ad350faaf033fb9d4dc08340782a5d095b77fdd8ab7bde4488ec3de1692384d87c815a6d89ff32d76bd15bd2fe949ddd17f8314d4f4fad72c4ef044d37408dcc875eef0141624f0502129f8a3c98c90cee7d6168273f1fb65db4bacde462466157937208b112efb2e4f4b03e174d1dabfe7da178f72bd0d6c4b2f93a1f1417d01758c92606aea94095de2b2b2f42ef0d693da5a5b38f89a578f494d0976bd677dc501ece42509c293eca333d1b201c69116039ef1146700c5d9e5139b02175fdb886c6bc7ff29936bbfda0a1e982a2aa92aaf7ab99bc98975f9dc574f014eab15c2d4e30162c6c5d1efe4ce2a399808831cffb59167dbe9806a0695e034f4c49d7c89a3e34da1dc0602f025e1ad5b8d19961399f7ec9f899d9c0d22f94a4aac5d80ec1cc6e8a0cb1b12beba7d619dc717f83e295cfb8de82463257f2ddadf93b55e95c7aaeeed75a36895ee9f6255fda2e15d3f6bed4086828378495d1dc7a7d9bb109dec0b1aa43d791c859cea325ae7cd528165190e2fb476d29aa73ce34d9763c4cd511fdd2c39a432c31d967a9cf2ad34f068e75465f04c7f07546c9f673036d0fd1ba94dc749c97dc3056411e18f4d10d513d522afc5601a93927d5d121d5b06bad5b4229b88e585125c4a4f0f184f9012cecfa001a46d6b6afad9eab3b778c56cbc5a0349202b3be39c8c43e0d38de3475c920c60e0a983a6a20947ca511a4fc81979b78cc2039c0e558fa384840feca4f21c2ed36a1c30520c334a661b09549a16f83ad2cda8cafdf6537fb4b3ec9e0eb1cd44475abdb0417bae3e67352926c7ffd5ef0669591b2edc7224ef8ffe85560efd66f1963de3e0f0aaedc0c103dbfc429b9725629ab77fdc02ee6d5f49989b55a9ef5322f1573317d527ba230d742b21583674dcca240273e11ab4bd1a78a9b24bf6f96b29e9063716633312d1ad49169dd7a4871a4522c0d0fd6e4f164d63710d94b39295664c0939ca375ac66d9be642d040ff10640c0874480d09e772963d82b19ee6a8892703adc75084a4e1f07da953a96f97101e5f19dac14781c31095a4f46ad86968355a49e3b1b5e57ac77c6664904d93dd5568b3cfe8e054b940ec708a8d66b71737007cef7f0ce06ba4941baf9a8334265eea266de380ba741e25d081a0dc9a0019ff34fe858788cf9f61889316374f8bda7b13a6b17424dec83fcbcf7f707ffefb63d136b25c19927893a0d97d048653d59e5c380756e49dd3d8e21534b16fbdb0ba16af3bee4b666f83f664fa75e1bbd494b59c3fb25126c126af405ad8024951ed5384c00342e213889fb19a62010888789d0406246011093667145a380f6392308878d7295fb4396e8ba1d23cbf1b03263b94b204bd47d2b4e46284c7c1ab0b38fbc1ef60deb4c3b60abeeb33197b96bd7e3ab9fdc9954ae7d21f53f5ee9e648afe711b08287edec9e37c3e24462c7d996c2b730ec6ba8eac9f0629f068277fd2b5d5ed33e71f8f051f1c1372ebc973814f8bf7ceacf33a74441d53f7feaf1128d4ea156c562720683929a1cc088d9ca63325c2137ad02c317de983cfbaf63de3b2ddf7dbc3fcf841e74881830c8e448b0755cac238be8484c284338944d86018d8b25300ab7eb4dc13b4e2dd8c5da40439db53287c4a182cc84dcfb826233772d31cd168d91916a715b5b9b3f32125c4023314be98a8e110ff9157c855f20933565dd50a006c53a4cd8c76e4ef7f3f952ee5d820b1fb09d34deed4c383e232d85df5b7bf78e8793aeb594f5eebc41efc53b08ef9e978770fad042a152c1fa2bd20b15d9b9b12abd8bf86a67e3b016f35885cc021558bffec6e971ed39a9235a763a386397c62a0c17ce0053a64643ff42ac2dfd4a68d4d11b6bdf2bbfc12cd1148a000aca0ad70e3c7ed7ceb181d0e3af39621973f76bcd55c93f21b344dd7d689f4dbb78e424c82960e37179d105ee1a39bbe5c8514d978dc64bf389a438eb17a7652ab2ddd52a0245d1777bf93c29676cc431d84b9a4855db4918cdda65ce8f2cf52ebe81bbb90cfee850f3400ae4b298490f647a158e266852629a2fe94f70ac49f2e51014c91ea6c95de2c2b80557b6da4b9a7e43535ba023dd6a2a03956446ad42387117f00484854b68f6886e8649db818d64a0f287b463151983db1628123b3d1ec0d0116c137662b2db4883fb136e5bdaca44902fd19bea5e1cd41e7be5f761fd59eea8b9e30c3cdee9dc8713c15a843814f17852401a7c6e57fad2bb60a33be897a3347d0a1e11c3792d04b5c029dca31fb8543032bd35b897c97fcac0e9e4a060e3090519ab84847a1e74401fcf392620") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') [ 1730.709197][ T26] audit: type=1400 audit(1557263802.540:34765): avc: denied { ioctl } for pid=14573 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:16:43 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') [ 1730.888294][ T26] audit: type=1400 audit(1557263802.580:34766): avc: denied { map } for pid=14643 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:43 executing program 3: syz_execute_func(&(0x7f0000000000)="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") [ 1731.020231][ T26] audit: type=1400 audit(1557263802.640:34767): avc: denied { map } for pid=14643 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1731.200272][ T26] audit: type=1400 audit(1557263802.640:34768): avc: denied { map } for pid=14643 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1731.390590][ T26] audit: type=1400 audit(1557263802.660:34769): avc: denied { ioctl } for pid=14687 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1731.547331][ T26] audit: type=1400 audit(1557263802.680:34770): avc: denied { map } for pid=14643 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1731.685936][ T26] audit: type=1400 audit(1557263802.680:34771): avc: denied { map } for pid=14643 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:44 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 21:16:44 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 21:16:44 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 21:16:44 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 21:16:45 executing program 3: syz_execute_func(&(0x7f0000000000)="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") 21:16:46 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 21:16:46 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4140, 0x0) fcntl$setsig(r0, 0xa, 0xb) fcntl$setlease(r0, 0x400, 0x1) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 21:16:46 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x1}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000800)="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") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') [ 1734.010965][T15201] cgroup: fork rejected by pids controller in /syz4 21:16:47 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000040), 0xe) listen(r0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000400), &(0x7f0000000440)=0x4) 21:16:47 executing program 4: syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000100), &(0x7f00000001c0)=0x22e) 21:16:47 executing program 0: add_key(&(0x7f00000012c0)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x8) getpid() ioprio_get$pid(0x3, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x0, 0x2) [ 1735.448657][ T26] kauditd_printk_skb: 115 callbacks suppressed [ 1735.448671][ T26] audit: type=1400 audit(1557263807.660:34887): avc: denied { map } for pid=15736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:47 executing program 3: syz_execute_func(&(0x7f0000000000)="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") [ 1735.617962][ T26] audit: type=1400 audit(1557263807.660:34888): avc: denied { map } for pid=15736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.795020][ T26] audit: type=1400 audit(1557263807.660:34889): avc: denied { map } for pid=15736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.998034][ T26] audit: type=1400 audit(1557263807.720:34890): avc: denied { map } for pid=15736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1736.160814][ T26] audit: type=1400 audit(1557263807.730:34891): avc: denied { map } for pid=15736 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1736.286782][ T26] audit: type=1400 audit(1557263807.790:34892): avc: denied { ioctl } for pid=15737 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1736.507186][ T26] audit: type=1400 audit(1557263807.860:34893): avc: denied { map } for pid=15736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1736.676377][ T26] audit: type=1400 audit(1557263807.860:34894): avc: denied { map } for pid=15736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1736.787436][ T26] audit: type=1400 audit(1557263807.890:34895): avc: denied { ioctl } for pid=15737 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1736.912721][ T26] audit: type=1400 audit(1557263807.930:34896): avc: denied { map } for pid=15736 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc00003c121f3199d070") syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad0fa43c020d48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f22de0ff8a10000000026460f740346d9f880ba100000ba83fee7c442f19034d304f4c441a5609c8ba800000054838b") 21:16:49 executing program 0: add_key(&(0x7f00000012c0)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x8) getpid() ioprio_get$pid(0x3, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x0, 0x2) 21:16:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x10) 21:16:49 executing program 2: add_key(&(0x7f00000012c0)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x8) getpid() ioprio_get$pid(0x3, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x0, 0x2) 21:16:49 executing program 3: syz_execute_func(&(0x7f0000000000)="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") 21:16:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="0739666aef8bf081e59605e37ddb98effa2f080431236267a702523a10bdfff23fb402557fb0a560480749e3ebebb91faae532b8dc37e2f7f6f8b6df6e91f7fcbad6f60a6506f5dc609e4f22ff3834e542cb68f6aeffa7f40d41df04dac1f25a1e51b3a558438d066098a33130617f000000fac88689dd0cb690b0d3ab0e9adfb72213972f20cb3ef3e1b1dda25363fe7513bd245733f94742f95deb20cb88f65e715f5c7cc706da82584e43ca4c9113045dcf8f6668c87b3b41a4313db3fea91f8e990712fe2a1ec778542c56147f0c6949c7ab1df0ab813cc9efee2868d6b5f0bb02d21a224586eee80032e81a530b3731b2b94c7626", 0xf7}], 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 21:16:50 executing program 0: add_key(&(0x7f00000012c0)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x8) getpid() ioprio_get$pid(0x3, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x0, 0x2) 21:16:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc00003c121f3199d070") syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad0fa43c020d48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f22de0ff8a10000000026460f740346d9f880ba100000ba83fee7c442f19034d304f4c441a5609c8ba800000054838b") 21:16:52 executing program 2: add_key(&(0x7f00000012c0)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x8) getpid() ioprio_get$pid(0x3, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x0, 0x2) 21:16:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="0739666aef8bf081e59605e37ddb98effa2f080431236267a702523a10bdfff23fb402557fb0a560480749e3ebebb91faae532b8dc37e2f7f6f8b6df6e91f7fcbad6f60a6506f5dc609e4f22ff3834e542cb68f6aeffa7f40d41df04dac1f25a1e51b3a558438d066098a33130617f000000fac88689dd0cb690b0d3ab0e9adfb72213972f20cb3ef3e1b1dda25363fe7513bd245733f94742f95deb20cb88f65e715f5c7cc706da82584e43ca4c9113045dcf8f6668c87b3b41a4313db3fea91f8e990712fe2a1ec778542c56147f0c6949c7ab1df0ab813cc9efee2868d6b5f0bb02d21a224586eee80032e81a530b3731b2b94c7626", 0xf7}], 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 21:16:52 executing program 0: add_key(&(0x7f00000012c0)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x8) getpid() ioprio_get$pid(0x3, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x0, 0x2) 21:16:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8000}, 0x5) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0dcab5bf9e2f9c4e1af5d0353fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c734512f8386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") 21:16:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") readv(0xffffffffffffffff, &(0x7f0000001780)=[{0x0}, {0x0}], 0x2) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) [ 1740.791523][ T26] kauditd_printk_skb: 144 callbacks suppressed [ 1740.791540][ T26] audit: type=1400 audit(1557263813.000:35041): avc: denied { ioctl } for pid=16307 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:16:53 executing program 2: add_key(&(0x7f00000012c0)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x8) getpid() ioprio_get$pid(0x3, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x0, 0x2) 21:16:53 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)='U', 0x1}], 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x7a) 21:16:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc00003c121f3199d070") syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad0fa43c020d48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f22de0ff8a10000000026460f740346d9f880ba100000ba83fee7c442f19034d304f4c441a5609c8ba800000054838b") 21:16:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="0739666aef8bf081e59605e37ddb98effa2f080431236267a702523a10bdfff23fb402557fb0a560480749e3ebebb91faae532b8dc37e2f7f6f8b6df6e91f7fcbad6f60a6506f5dc609e4f22ff3834e542cb68f6aeffa7f40d41df04dac1f25a1e51b3a558438d066098a33130617f000000fac88689dd0cb690b0d3ab0e9adfb72213972f20cb3ef3e1b1dda25363fe7513bd245733f94742f95deb20cb88f65e715f5c7cc706da82584e43ca4c9113045dcf8f6668c87b3b41a4313db3fea91f8e990712fe2a1ec778542c56147f0c6949c7ab1df0ab813cc9efee2868d6b5f0bb02d21a224586eee80032e81a530b3731b2b94c7626", 0xf7}], 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1741.438379][ T26] audit: type=1400 audit(1557263813.630:35042): avc: denied { map } for pid=16407 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1741.538335][ T26] audit: type=1400 audit(1557263813.650:35043): avc: denied { map } for pid=16407 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1741.688018][ T26] audit: type=1400 audit(1557263813.650:35044): avc: denied { map } for pid=16407 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1741.827304][ T26] audit: type=1400 audit(1557263813.650:35045): avc: denied { map } for pid=16407 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1741.987988][ T26] audit: type=1400 audit(1557263813.720:35046): avc: denied { ioctl } for pid=16411 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1742.180944][ T26] audit: type=1400 audit(1557263813.750:35047): avc: denied { map } for pid=16407 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1742.309509][ T26] audit: type=1400 audit(1557263813.780:35048): avc: denied { map } for pid=16407 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:54 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002b80)={0x0, 0x3, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [0xfeffffff], 0xffffffffffffffff}, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x33}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'rmd160\x00'}}}]}, 0x138}}, 0x0) [ 1742.482345][ T26] audit: type=1400 audit(1557263813.800:35049): avc: denied { ioctl } for pid=16411 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:16:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") readv(0xffffffffffffffff, &(0x7f0000001780)=[{0x0}, {0x0}], 0x2) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) 21:16:54 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)='U', 0x1}], 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x7a) [ 1742.680489][ T26] audit: type=1400 audit(1557263813.830:35050): avc: denied { map } for pid=16407 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="0739666aef8bf081e59605e37ddb98effa2f080431236267a702523a10bdfff23fb402557fb0a560480749e3ebebb91faae532b8dc37e2f7f6f8b6df6e91f7fcbad6f60a6506f5dc609e4f22ff3834e542cb68f6aeffa7f40d41df04dac1f25a1e51b3a558438d066098a33130617f000000fac88689dd0cb690b0d3ab0e9adfb72213972f20cb3ef3e1b1dda25363fe7513bd245733f94742f95deb20cb88f65e715f5c7cc706da82584e43ca4c9113045dcf8f6668c87b3b41a4313db3fea91f8e990712fe2a1ec778542c56147f0c6949c7ab1df0ab813cc9efee2868d6b5f0bb02d21a224586eee80032e81a530b3731b2b94c7626", 0xf7}], 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 21:16:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc00003c121f3199d070") syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad0fa43c020d48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f22de0ff8a10000000026460f740346d9f880ba100000ba83fee7c442f19034d304f4c441a5609c8ba800000054838b") 21:16:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002b80)={0x0, 0x3, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [0xfeffffff], 0xffffffffffffffff}, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x33}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'rmd160\x00'}}}]}, 0x138}}, 0x0) 21:16:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8000}, 0x5) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0dcab5bf9e2f9c4e1af5d0353fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c734512f8386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") 21:16:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002b80)={0x0, 0x3, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [0xfeffffff], 0xffffffffffffffff}, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x33}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'rmd160\x00'}}}]}, 0x138}}, 0x0) 21:16:56 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)='U', 0x1}], 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x7a) 21:16:57 executing program 4: syz_execute_func(&(0x7f0000000180)="1c1998cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c4e1c971f099f16be1fed4f47d82663ed107c4c2b90a23f216c4c1f8ae9600000100c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff7e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 21:16:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x40000, 0x0) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000380)={0xe, 0x9, 0x9ca, 0x2333, 0x5c, "497f3ca13167963a284739ab827185fa5c17cd1d2336e26454877d1a1c2bd03cc01af3c93cff8775527c97c4467df9b199ec8ff57535af9ea100e7722b2310c5887e65bce7aa11dcc8f62b4597ce48e520a257562724988481f749ff"}, 0x68) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x4800, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) getpgrp(0x0) r4 = gettid() fcntl$lock(r1, 0x27, &(0x7f00000001c0)={0x40000, 0x1, 0x1, 0x0, r4}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r3) fcntl$lock(r0, 0x26, &(0x7f0000000040)={0x1}) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fffffff, 0x10080) 21:16:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8000}, 0x5) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0dcab5bf9e2f9c4e1af5d0353fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c734512f8386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") 21:16:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002b80)={0x0, 0x3, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [0xfeffffff], 0xffffffffffffffff}, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x33}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'rmd160\x00'}}}]}, 0x138}}, 0x0) [ 1745.843194][ T26] kauditd_printk_skb: 134 callbacks suppressed [ 1745.843209][ T26] audit: type=1400 audit(1557263818.050:35186): avc: denied { map } for pid=16750 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1746.010577][ T26] audit: type=1400 audit(1557263818.050:35187): avc: denied { map } for pid=16750 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1746.142553][ T26] audit: type=1400 audit(1557263818.050:35185): avc: denied { ioctl } for pid=16745 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1746.316692][ T26] audit: type=1400 audit(1557263818.090:35188): avc: denied { map } for pid=16750 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1746.471069][ T26] audit: type=1400 audit(1557263818.120:35189): avc: denied { map } for pid=16750 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") readv(0xffffffffffffffff, &(0x7f0000001780)=[{0x0}, {0x0}], 0x2) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) 21:16:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x14, r1, 0x7}, 0x14}}, 0x0) 21:16:58 executing program 4: syz_execute_func(&(0x7f0000000180)="1c1998cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c4e1c971f099f16be1fed4f47d82663ed107c4c2b90a23f216c4c1f8ae9600000100c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff7e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 21:16:58 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)='U', 0x1}], 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x7a) 21:16:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x68, &(0x7f0000000280)) close(r0) [ 1746.651303][ T26] audit: type=1400 audit(1557263818.170:35190): avc: denied { map } for pid=16750 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1746.784952][ T26] audit: type=1400 audit(1557263818.240:35191): avc: denied { map } for pid=16750 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:59 executing program 4: syz_execute_func(&(0x7f0000000180)="1c1998cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c4e1c971f099f16be1fed4f47d82663ed107c4c2b90a23f216c4c1f8ae9600000100c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff7e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") [ 1747.097929][ T26] audit: type=1400 audit(1557263818.240:35192): avc: denied { map } for pid=16750 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:16:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8000}, 0x5) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0dcab5bf9e2f9c4e1af5d0353fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c734512f8386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") [ 1747.247985][ T26] audit: type=1400 audit(1557263818.320:35193): avc: denied { map } for pid=16750 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1747.398339][ T26] audit: type=1400 audit(1557263818.320:35194): avc: denied { map } for pid=16750 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20040800}, 0xc811) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:17:00 executing program 4: syz_execute_func(&(0x7f0000000180)="1c1998cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c4e1c971f099f16be1fed4f47d82663ed107c4c2b90a23f216c4c1f8ae9600000100c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff7e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 21:17:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x68, &(0x7f0000000280)) close(r0) 21:17:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x68, &(0x7f0000000280)) close(r0) 21:17:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") readv(0xffffffffffffffff, &(0x7f0000001780)=[{0x0}, {0x0}], 0x2) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) 21:17:01 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2b, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 21:17:01 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18}, 0x18) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = eventfd2(0x0, 0x0) splice(r1, 0x0, r2, 0x0, 0x100000001, 0x0) 21:17:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x68, &(0x7f0000000280)) close(r0) 21:17:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20040800}, 0xc811) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:17:02 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2b, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 21:17:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x68, &(0x7f0000000280)) close(r0) [ 1750.869414][ T26] kauditd_printk_skb: 184 callbacks suppressed [ 1750.869461][ T26] audit: type=1400 audit(1557263823.080:35379): avc: denied { map } for pid=17270 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1751.030235][ T26] audit: type=1400 audit(1557263823.180:35380): avc: denied { map } for pid=17270 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1751.184943][ T26] audit: type=1400 audit(1557263823.190:35381): avc: denied { map } for pid=17270 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:03 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2b, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) [ 1751.357041][ T26] audit: type=1400 audit(1557263823.340:35382): avc: denied { map } for pid=17310 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:03 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x203) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) shmat(r0, &(0x7f0000ff3000/0x3000)=nil, 0x0) write$ppp(0xffffffffffffffff, &(0x7f0000000040)='~\\', 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x703d}}}, 0xb8}}, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) 21:17:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x68, &(0x7f0000000280)) close(r0) 21:17:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000001200)="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") [ 1751.528210][ T26] audit: type=1400 audit(1557263823.360:35383): avc: denied { map } for pid=17310 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1751.729574][ T26] audit: type=1400 audit(1557263823.380:35384): avc: denied { map } for pid=17310 comm="sh" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20040800}, 0xc811) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:17:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x68, &(0x7f0000000280)) close(r0) [ 1751.894039][ T26] audit: type=1400 audit(1557263823.390:35385): avc: denied { ioctl } for pid=17406 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1752.095399][ T26] audit: type=1400 audit(1557263823.430:35386): avc: denied { map } for pid=17310 comm="sh" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1752.285435][ T26] audit: type=1400 audit(1557263823.500:35387): avc: denied { map } for pid=17310 comm="sh" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:04 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2b, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) [ 1752.461540][ T26] audit: type=1400 audit(1557263823.550:35388): avc: denied { map } for pid=17310 comm="sh" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000001200)="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") 21:17:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") syz_execute_func(&(0x7f00000001c0)="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") 21:17:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000003640)='/dev/loop#\x00', 0x0, 0x0) fdatasync(r0) 21:17:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 21:17:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20040800}, 0xc811) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:17:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') write$P9_RWALK(r1, 0x0, 0x0) 21:17:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000003640)='/dev/loop#\x00', 0x0, 0x0) fdatasync(r0) 21:17:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) close(r0) 21:17:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000001200)="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") 21:17:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000003640)='/dev/loop#\x00', 0x0, 0x0) fdatasync(r0) [ 1755.980360][ T26] kauditd_printk_skb: 147 callbacks suppressed [ 1755.980376][ T26] audit: type=1400 audit(1557263828.190:35536): avc: denied { map } for pid=17868 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:08 executing program 2: syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') socket$inet6(0xa, 0x400000080001, 0x0) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000080), 0x0) [ 1756.118006][ T26] audit: type=1400 audit(1557263828.190:35537): avc: denied { map } for pid=17868 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1756.315814][ T26] audit: type=1400 audit(1557263828.300:35538): avc: denied { ioctl } for pid=17897 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:17:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 1756.610313][ T26] audit: type=1400 audit(1557263828.380:35539): avc: denied { map } for pid=17868 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 21:17:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000001200)="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") [ 1756.841888][ T26] audit: type=1400 audit(1557263828.380:35540): avc: denied { map } for pid=17868 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) close(r0) [ 1757.029304][ T26] audit: type=1400 audit(1557263828.460:35541): avc: denied { map } for pid=17904 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000003640)='/dev/loop#\x00', 0x0, 0x0) fdatasync(r0) [ 1757.204767][ T26] audit: type=1400 audit(1557263828.470:35542): avc: denied { map } for pid=17904 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1757.360810][ T26] audit: type=1400 audit(1557263828.490:35543): avc: denied { map } for pid=17904 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1757.536973][ T26] audit: type=1400 audit(1557263828.500:35544): avc: denied { map } for pid=17904 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1757.726773][ T26] audit: type=1400 audit(1557263828.580:35545): avc: denied { ioctl } for pid=17917 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:17:10 executing program 2: syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') socket$inet6(0xa, 0x400000080001, 0x0) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000080), 0x0) 21:17:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) close(r0) 21:17:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 21:17:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) close(r0) 21:17:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 21:17:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 21:17:11 executing program 2: syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') socket$inet6(0xa, 0x400000080001, 0x0) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000080), 0x0) 21:17:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) close(r0) 21:17:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 21:17:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) close(r0) [ 1761.020021][ T26] kauditd_printk_skb: 169 callbacks suppressed [ 1761.020035][ T26] audit: type=1400 audit(1557263833.230:35715): avc: denied { map } for pid=18531 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.048057][ C1] net_ratelimit: 2 callbacks suppressed [ 1761.048067][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1761.062222][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1761.068149][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1761.073917][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:17:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 1761.202692][ T26] audit: type=1400 audit(1557263833.230:35716): avc: denied { map } for pid=18531 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:13 executing program 2: syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_triestat\x00') socket$inet6(0xa, 0x400000080001, 0x0) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000080), 0x0) [ 1761.413925][ T26] audit: type=1400 audit(1557263833.310:35717): avc: denied { map } for pid=18531 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 1761.589956][ T26] audit: type=1400 audit(1557263833.350:35718): avc: denied { map } for pid=18531 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.787078][ T26] audit: type=1400 audit(1557263833.350:35719): avc: denied { map } for pid=18531 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.979427][ T26] audit: type=1400 audit(1557263833.420:35720): avc: denied { map } for pid=18531 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1762.213152][ T26] audit: type=1400 audit(1557263833.420:35721): avc: denied { map } for pid=18531 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1762.415522][ T26] audit: type=1400 audit(1557263833.520:35722): avc: denied { map } for pid=18572 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x6f, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) close(r0) [ 1762.605347][ T26] audit: type=1400 audit(1557263833.550:35724): avc: denied { map } for pid=18531 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 1762.799478][ T26] audit: type=1400 audit(1557263833.550:35725): avc: denied { map } for pid=18531 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 21:17:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x5452, &(0x7f0000000180)={0x1}) 21:17:16 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x4000000080000005) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r0, r2) 21:17:16 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x7ff, 0x800000004, 0x7}, 0x3c) 21:17:16 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000240)='/dev/snd/midiC#D#\x00', 0x200, 0x2) read(r1, &(0x7f0000000140)=""/197, 0xc5) dup3(r0, r1, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 21:17:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 21:17:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x5452, &(0x7f0000000180)={0x1}) 21:17:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x0, 0x10000}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffebc, 0x0, 0x0, 0x1a0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000000)={'ah\x00'}, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0xe}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:17:17 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x4000000080000005) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r0, r2) 21:17:17 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x7ff, 0x800000004, 0x7}, 0x3c) 21:17:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x5452, &(0x7f0000000180)={0x1}) [ 1766.099863][ T26] kauditd_printk_skb: 171 callbacks suppressed [ 1766.099878][ T26] audit: type=1400 audit(1557263838.310:35893): avc: denied { map } for pid=19059 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 1766.380267][ T26] audit: type=1400 audit(1557263838.340:35894): avc: denied { map } for pid=19154 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:18 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000240)='/dev/snd/midiC#D#\x00', 0x200, 0x2) read(r1, &(0x7f0000000140)=""/197, 0xc5) dup3(r0, r1, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 21:17:18 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x4000000080000005) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r0, r2) [ 1766.543052][ T26] audit: type=1400 audit(1557263838.360:35896): avc: denied { map } for pid=19059 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x0, 0x10000}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffebc, 0x0, 0x0, 0x1a0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000000)={'ah\x00'}, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0xe}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1766.777952][ T26] audit: type=1400 audit(1557263838.340:35895): avc: denied { map } for pid=19154 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x7ff, 0x800000004, 0x7}, 0x3c) [ 1766.935569][ T26] audit: type=1400 audit(1557263838.400:35897): avc: denied { map } for pid=19154 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.184781][ T26] audit: type=1400 audit(1557263838.410:35898): avc: denied { map } for pid=19154 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x5452, &(0x7f0000000180)={0x1}) [ 1767.397932][ T26] audit: type=1400 audit(1557263838.490:35899): avc: denied { map } for pid=19154 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.567923][ T26] audit: type=1400 audit(1557263838.530:35900): avc: denied { map } for pid=19154 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.827063][ T26] audit: type=1400 audit(1557263838.530:35901): avc: denied { map } for pid=19154 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:20 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x4000000080000005) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r0, r2) [ 1767.994048][ T26] audit: type=1400 audit(1557263838.700:35902): avc: denied { map } for pid=19270 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x0, 0x10000}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffebc, 0x0, 0x0, 0x1a0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000000)={'ah\x00'}, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0xe}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:17:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x7ff, 0x800000004, 0x7}, 0x3c) 21:17:20 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000240)='/dev/snd/midiC#D#\x00', 0x200, 0x2) read(r1, &(0x7f0000000140)=""/197, 0xc5) dup3(r0, r1, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 21:17:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x0, 0x10000}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffebc, 0x0, 0x0, 0x1a0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000000)={'ah\x00'}, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0xe}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:17:21 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r0, &(0x7f0000001500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000001) 21:17:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x108, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x108}}, 0x4000000000000000) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") 21:17:21 executing program 3: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x658be000, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x0, 0x9e945000, 0x3e0000}], 0x0) 21:17:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x0, 0x10000}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffebc, 0x0, 0x0, 0x1a0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000000)={'ah\x00'}, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0xe}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:17:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x0, 0x10000}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffebc, 0x0, 0x0, 0x1a0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000000)={'ah\x00'}, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0xe}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:17:22 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000240)='/dev/snd/midiC#D#\x00', 0x200, 0x2) read(r1, &(0x7f0000000140)=""/197, 0xc5) dup3(r0, r1, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 21:17:22 executing program 3: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x658be000, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x0, 0x9e945000, 0x3e0000}], 0x0) 21:17:23 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x2, &(0x7f0000527ff8)=0x70c3, 0x2, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000401000/0x3000)=nil, 0x2) [ 1771.131888][ T26] kauditd_printk_skb: 179 callbacks suppressed [ 1771.131901][ T26] audit: type=1400 audit(1557263843.340:36076): avc: denied { map } for pid=19727 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1771.290044][ T26] audit: type=1400 audit(1557263843.360:36077): avc: denied { ioctl } for pid=19747 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:17:23 executing program 5: r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:17:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x108, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x108}}, 0x4000000000000000) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") [ 1771.528083][ T26] audit: type=1400 audit(1557263843.380:36078): avc: denied { map } for pid=19727 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x0, 0x10000}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffebc, 0x0, 0x0, 0x1a0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000000)={'ah\x00'}, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0xe}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1771.717130][ T26] audit: type=1400 audit(1557263843.410:36079): avc: denied { map } for pid=19745 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1771.883837][ T26] audit: type=1400 audit(1557263843.410:36080): avc: denied { map } for pid=19745 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1772.041814][ T26] audit: type=1400 audit(1557263843.430:36081): avc: denied { map } for pid=19745 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:24 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x2, &(0x7f0000527ff8)=0x70c3, 0x2, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000401000/0x3000)=nil, 0x2) 21:17:24 executing program 3: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x658be000, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x0, 0x9e945000, 0x3e0000}], 0x0) 21:17:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000005c0)={{0x3, 0x0, 0x81, 0x1, 0xc7}, 0xfff, 0x1, 'id0\x00', 'timer0\x00', 0x0, 0x8, 0x100000001, 0x4, 0x5}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000001c0)="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") [ 1772.258042][ T26] audit: type=1400 audit(1557263843.430:36082): avc: denied { map } for pid=19745 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1772.410298][ T26] audit: type=1400 audit(1557263843.440:36083): avc: denied { map } for pid=19727 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1772.539213][ T26] audit: type=1400 audit(1557263843.440:36084): avc: denied { map } for pid=19727 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:24 executing program 2: syz_execute_func(&(0x7f0000000180)="0c0a34b598cd8052a05ce8e86962f5696200d9d9d0d260c6c7e4c753fbc46111edca7ec4c47d0f82822a00c4356af2178f4808eebce000008020004f67c4c7dd6d68e948e948c1ea014739050000005bc4a131ebca45363ef80f9966030faee42c2467e2f2abab000026400f0d18c401fe5ff6df646734676683660f114d6666450f17720d1411") [ 1772.760448][ T26] audit: type=1400 audit(1557263843.450:36085): avc: denied { ioctl } for pid=19715 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:17:25 executing program 5: r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:17:25 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x2, &(0x7f0000527ff8)=0x70c3, 0x2, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000401000/0x3000)=nil, 0x2) 21:17:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x108, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x108}}, 0x4000000000000000) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") 21:17:25 executing program 3: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x658be000, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x0, 0x9e945000, 0x3e0000}], 0x0) 21:17:25 executing program 2: syz_execute_func(&(0x7f0000000180)="0c0a34b598cd8052a05ce8e86962f5696200d9d9d0d260c6c7e4c753fbc46111edca7ec4c47d0f82822a00c4356af2178f4808eebce000008020004f67c4c7dd6d68e948e948c1ea014739050000005bc4a131ebca45363ef80f9966030faee42c2467e2f2abab000026400f0d18c401fe5ff6df646734676683660f114d6666450f17720d1411") 21:17:26 executing program 1: r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:17:26 executing program 0: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x2, &(0x7f0000527ff8)=0x70c3, 0x2, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000401000/0x3000)=nil, 0x2) 21:17:26 executing program 2: syz_execute_func(&(0x7f0000000180)="0c0a34b598cd8052a05ce8e86962f5696200d9d9d0d260c6c7e4c753fbc46111edca7ec4c47d0f82822a00c4356af2178f4808eebce000008020004f67c4c7dd6d68e948e948c1ea014739050000005bc4a131ebca45363ef80f9966030faee42c2467e2f2abab000026400f0d18c401fe5ff6df646734676683660f114d6666450f17720d1411") 21:17:27 executing program 5: r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:17:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="8971f7d010b3321e34e31e70b2be91ee4b1fb89d2d12cdedc665a7bb31deecfb3d3bb21c4f305b036b597959c3f2550231", @ANYRESOCT], 0x48}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e18015d1ab39fd5bf9e2f9d70f0fcab03a1cae5e090000bac7bae4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43c4a19b5da2008000000f186746f340ae65657c7c730f8052043823de8f0f14e746d9f8fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:17:27 executing program 0: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f000078eff8)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, 0x0) r0 = creat(&(0x7f0000015ff4)='./file0/bus\x00', 0x0) mq_notify(r0, &(0x7f0000477fa0)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) close(r0) 21:17:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x108, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x108}}, 0x4000000000000000) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") 21:17:27 executing program 2: syz_execute_func(&(0x7f0000000180)="0c0a34b598cd8052a05ce8e86962f5696200d9d9d0d260c6c7e4c753fbc46111edca7ec4c47d0f82822a00c4356af2178f4808eebce000008020004f67c4c7dd6d68e948e948c1ea014739050000005bc4a131ebca45363ef80f9966030faee42c2467e2f2abab000026400f0d18c401fe5ff6df646734676683660f114d6666450f17720d1411") 21:17:27 executing program 1: r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 1776.157718][ T26] kauditd_printk_skb: 137 callbacks suppressed [ 1776.157733][ T26] audit: type=1400 audit(1557263848.360:36223): avc: denied { map } for pid=20018 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.352364][ T26] audit: type=1400 audit(1557263848.380:36224): avc: denied { map } for pid=20016 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.518644][ T26] audit: type=1400 audit(1557263848.400:36225): avc: denied { map } for pid=20018 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") getegid() syz_execute_func(&(0x7f0000000100)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2160f01c4c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_execute_func(&(0x7f0000000480)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c08fe978e125001000020f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa646808cb0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") 21:17:28 executing program 5: r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 1776.708672][ T26] audit: type=1400 audit(1557263848.430:36226): avc: denied { map } for pid=20016 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.921657][ T26] audit: type=1400 audit(1557263848.450:36227): avc: denied { map } for pid=20018 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1777.104415][ T26] audit: type=1400 audit(1557263848.450:36228): avc: denied { map } for pid=20018 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:29 executing program 0: r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$setlease(r0, 0x400, 0x0) ftruncate(r0, 0x0) [ 1777.260344][ T26] audit: type=1400 audit(1557263848.450:36229): avc: denied { map } for pid=20016 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:29 executing program 1: r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 1777.406619][ T26] audit: type=1400 audit(1557263848.510:36230): avc: denied { map } for pid=20018 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:29 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\xc2(t\xf56c\xf71E\x9e\x90\xac\xa4\x19\x7f\xa1\xb8\x02x9\xff0\x7f\x94\xa7\xbeX\xd2\xed\x0e^>@\xaf\x11c\xce19\xf5\xf8\xd3\x19k\x1d\xa5\x99\x89\xb4=\x1b\xde\x88g\xf4\xadi\xef\xbe\x13\xaaU\xdc\xdcw\r\xe1 jy8\n%\xde\x86\xb8ExAkCBp\x18/\x80W.[\r\x13\xc0e\x8f9i\xc5\x95\xca\xd1\xba&?\xe65}\xe9\nl\xb4b\xa7\x9dH\"\xf3\xaa>4\xe9A$\xf9\x04\xeb\xd5\x00\xb7,\x80\x1a\xaf\xbeP\f\xec\xa8\xc1l\xbb\xe9\xc2\x01\xe7\xf4mD\x80m\xc2\xbd|\x06\b\xd2\xc9\xdb\xcb\x83\xb2\xda\xa7\xc5\xf1J\xd2\xf7i\x95\xb7\xc0\xf4nEU.\x0e\x9b\xb6\x87\x13\xd5\xa8\x7f\x16\xc3\xac\x9d,\xa24>9\xa46\x8c\x7f\x00\x00\x00\x00\x00\x00\x00\x04\xf6\x8f\x0e|\xa0|\x8aw\x87\x9f\xec\xebQ\xa2\xf4[3\xdeF\xce\xf2\xb4\xf9H@\xce8\xe4\xf8\xd3\xf0', 0x200002, 0x0) fchdir(r1) syz_execute_func(&(0x7f0000000180)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e110f2fcf7c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56eabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c0f20fd0b436f40000000f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa64680b0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") [ 1777.562915][ T26] audit: type=1400 audit(1557263848.520:36231): avc: denied { map } for pid=20016 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1777.690819][ T26] audit: type=1400 audit(1557263848.530:36232): avc: denied { ioctl } for pid=20021 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:17:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) setreuid(0x0, 0xee00) sendto$inet(r1, &(0x7f0000000280)='D', 0x1, 0x4008000, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='K', 0x1, 0x2000404ffff, 0x0, 0x0) 21:17:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0x105, 0x0}, 0x0) syz_execute_func(&(0x7f0000000340)="91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c3c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c7336646466440f3832931bcc00003833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a51f15d04d4d441a5609c8ba8000000546736670fe5ee") 21:17:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="8971f7d010b3321e34e31e70b2be91ee4b1fb89d2d12cdedc665a7bb31deecfb3d3bb21c4f305b036b597959c3f2550231", @ANYRESOCT], 0x48}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e18015d1ab39fd5bf9e2f9d70f0fcab03a1cae5e090000bac7bae4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43c4a19b5da2008000000f186746f340ae65657c7c730f8052043823de8f0f14e746d9f8fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:17:31 executing program 0: r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$setlease(r0, 0x400, 0x0) ftruncate(r0, 0x0) 21:17:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="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") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 21:17:31 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\xc2(t\xf56c\xf71E\x9e\x90\xac\xa4\x19\x7f\xa1\xb8\x02x9\xff0\x7f\x94\xa7\xbeX\xd2\xed\x0e^>@\xaf\x11c\xce19\xf5\xf8\xd3\x19k\x1d\xa5\x99\x89\xb4=\x1b\xde\x88g\xf4\xadi\xef\xbe\x13\xaaU\xdc\xdcw\r\xe1 jy8\n%\xde\x86\xb8ExAkCBp\x18/\x80W.[\r\x13\xc0e\x8f9i\xc5\x95\xca\xd1\xba&?\xe65}\xe9\nl\xb4b\xa7\x9dH\"\xf3\xaa>4\xe9A$\xf9\x04\xeb\xd5\x00\xb7,\x80\x1a\xaf\xbeP\f\xec\xa8\xc1l\xbb\xe9\xc2\x01\xe7\xf4mD\x80m\xc2\xbd|\x06\b\xd2\xc9\xdb\xcb\x83\xb2\xda\xa7\xc5\xf1J\xd2\xf7i\x95\xb7\xc0\xf4nEU.\x0e\x9b\xb6\x87\x13\xd5\xa8\x7f\x16\xc3\xac\x9d,\xa24>9\xa46\x8c\x7f\x00\x00\x00\x00\x00\x00\x00\x04\xf6\x8f\x0e|\xa0|\x8aw\x87\x9f\xec\xebQ\xa2\xf4[3\xdeF\xce\xf2\xb4\xf9H@\xce8\xe4\xf8\xd3\xf0', 0x200002, 0x0) fchdir(r1) syz_execute_func(&(0x7f0000000180)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e110f2fcf7c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="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") 21:17:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="18"], 0x1}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x4924944, 0x0) 21:17:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="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") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 1779.824565][T20376] cgroup: fork rejected by pids controller in /syz5 21:17:32 executing program 0: r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$setlease(r0, 0x400, 0x0) ftruncate(r0, 0x0) 21:17:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="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") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 21:17:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="18"], 0x1}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x4924944, 0x0) 21:17:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="8971f7d010b3321e34e31e70b2be91ee4b1fb89d2d12cdedc665a7bb31deecfb3d3bb21c4f305b036b597959c3f2550231", @ANYRESOCT], 0x48}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e18015d1ab39fd5bf9e2f9d70f0fcab03a1cae5e090000bac7bae4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43c4a19b5da2008000000f186746f340ae65657c7c730f8052043823de8f0f14e746d9f8fe5ff6e7df0804f4c441a5609c8ba80000005499") 21:17:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0x105, 0x0}, 0x0) syz_execute_func(&(0x7f0000000340)="91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c3c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c7336646466440f3832931bcc00003833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a51f15d04d4d441a5609c8ba8000000546736670fe5ee") [ 1781.196843][ T26] kauditd_printk_skb: 140 callbacks suppressed [ 1781.196860][ T26] audit: type=1400 audit(1557263853.400:36373): avc: denied { map } for pid=20730 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1781.388548][ T26] audit: type=1400 audit(1557263853.450:36374): avc: denied { map } for pid=20730 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1781.560127][ T26] audit: type=1400 audit(1557263853.450:36375): avc: denied { map } for pid=20730 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1781.721409][ T26] audit: type=1400 audit(1557263853.450:36376): avc: denied { map } for pid=20730 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:34 executing program 0: r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$setlease(r0, 0x400, 0x0) ftruncate(r0, 0x0) [ 1781.871451][ T26] audit: type=1400 audit(1557263853.520:36377): avc: denied { map } for pid=20730 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="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") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 21:17:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="18"], 0x1}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x4924944, 0x0) [ 1782.081430][ T26] audit: type=1400 audit(1557263853.590:36378): avc: denied { map } for pid=20730 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1782.220836][ T26] audit: type=1400 audit(1557263853.590:36379): avc: denied { map } for pid=20730 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1782.420947][ T26] audit: type=1400 audit(1557263853.600:36380): avc: denied { map } for pid=20748 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="8971f7d010b3321e34e31e70b2be91ee4b1fb89d2d12cdedc665a7bb31deecfb3d3bb21c4f305b036b597959c3f2550231", @ANYRESOCT], 0x48}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e18015d1ab39fd5bf9e2f9d70f0fcab03a1cae5e090000bac7bae4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43c4a19b5da2008000000f186746f340ae65657c7c730f8052043823de8f0f14e746d9f8fe5ff6e7df0804f4c441a5609c8ba80000005499") [ 1782.554296][ T26] audit: type=1400 audit(1557263853.630:36381): avc: denied { map } for pid=20748 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1782.697441][ T26] audit: type=1400 audit(1557263853.660:36382): avc: denied { map } for pid=20748 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:35 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\xc2(t\xf56c\xf71E\x9e\x90\xac\xa4\x19\x7f\xa1\xb8\x02x9\xff0\x7f\x94\xa7\xbeX\xd2\xed\x0e^>@\xaf\x11c\xce19\xf5\xf8\xd3\x19k\x1d\xa5\x99\x89\xb4=\x1b\xde\x88g\xf4\xadi\xef\xbe\x13\xaaU\xdc\xdcw\r\xe1 jy8\n%\xde\x86\xb8ExAkCBp\x18/\x80W.[\r\x13\xc0e\x8f9i\xc5\x95\xca\xd1\xba&?\xe65}\xe9\nl\xb4b\xa7\x9dH\"\xf3\xaa>4\xe9A$\xf9\x04\xeb\xd5\x00\xb7,\x80\x1a\xaf\xbeP\f\xec\xa8\xc1l\xbb\xe9\xc2\x01\xe7\xf4mD\x80m\xc2\xbd|\x06\b\xd2\xc9\xdb\xcb\x83\xb2\xda\xa7\xc5\xf1J\xd2\xf7i\x95\xb7\xc0\xf4nEU.\x0e\x9b\xb6\x87\x13\xd5\xa8\x7f\x16\xc3\xac\x9d,\xa24>9\xa46\x8c\x7f\x00\x00\x00\x00\x00\x00\x00\x04\xf6\x8f\x0e|\xa0|\x8aw\x87\x9f\xec\xebQ\xa2\xf4[3\xdeF\xce\xf2\xb4\xf9H@\xce8\xe4\xf8\xd3\xf0', 0x200002, 0x0) fchdir(r1) syz_execute_func(&(0x7f0000000180)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e110f2fcf7c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="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") 21:17:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="18"], 0x1}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x4924944, 0x0) 21:17:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="18"], 0x1}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x4924944, 0x0) 21:17:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="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") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 21:17:36 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file1\x00') lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000500)={0x0, 0xfb, 0x15, 0x0, 0x9, "09d587884f4d817fc4ae204ca72193d1"}, 0x15, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f00000006c0)) 21:17:36 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00'}) 21:17:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="18"], 0x1}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x4924944, 0x0) 21:17:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0x105, 0x0}, 0x0) syz_execute_func(&(0x7f0000000340)="91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c3c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c7336646466440f3832931bcc00003833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a51f15d04d4d441a5609c8ba8000000546736670fe5ee") 21:17:37 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00'}) 21:17:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="18"], 0x1}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x4924944, 0x0) 21:17:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 21:17:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="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") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 21:17:38 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\xc2(t\xf56c\xf71E\x9e\x90\xac\xa4\x19\x7f\xa1\xb8\x02x9\xff0\x7f\x94\xa7\xbeX\xd2\xed\x0e^>@\xaf\x11c\xce19\xf5\xf8\xd3\x19k\x1d\xa5\x99\x89\xb4=\x1b\xde\x88g\xf4\xadi\xef\xbe\x13\xaaU\xdc\xdcw\r\xe1 jy8\n%\xde\x86\xb8ExAkCBp\x18/\x80W.[\r\x13\xc0e\x8f9i\xc5\x95\xca\xd1\xba&?\xe65}\xe9\nl\xb4b\xa7\x9dH\"\xf3\xaa>4\xe9A$\xf9\x04\xeb\xd5\x00\xb7,\x80\x1a\xaf\xbeP\f\xec\xa8\xc1l\xbb\xe9\xc2\x01\xe7\xf4mD\x80m\xc2\xbd|\x06\b\xd2\xc9\xdb\xcb\x83\xb2\xda\xa7\xc5\xf1J\xd2\xf7i\x95\xb7\xc0\xf4nEU.\x0e\x9b\xb6\x87\x13\xd5\xa8\x7f\x16\xc3\xac\x9d,\xa24>9\xa46\x8c\x7f\x00\x00\x00\x00\x00\x00\x00\x04\xf6\x8f\x0e|\xa0|\x8aw\x87\x9f\xec\xebQ\xa2\xf4[3\xdeF\xce\xf2\xb4\xf9H@\xce8\xe4\xf8\xd3\xf0', 0x200002, 0x0) fchdir(r1) syz_execute_func(&(0x7f0000000180)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e110f2fcf7c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="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") 21:17:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, {}, 0xffffffffffffff87}, 0xffffffffffffffab) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="f2af91930f0124eda133fa20430fbafce852f6618890c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340aec423b549d8535b955f420f383c02c401405c6bfdd70fc7f833fec421d5e234bbab6464660f38323c4c8f8fdbc1a1fe5ff6f6df0804f4c4a5b3609c0f01c4288ba6452e00005480") 21:17:38 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00'}) [ 1786.476270][ T26] kauditd_printk_skb: 143 callbacks suppressed [ 1786.476287][ T26] audit: type=1400 audit(1557263858.680:36526): avc: denied { map } for pid=21276 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1786.609678][ T26] audit: type=1400 audit(1557263858.720:36527): avc: denied { map } for pid=21276 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0x105, 0x0}, 0x0) syz_execute_func(&(0x7f0000000340)="91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c3c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c7336646466440f3832931bcc00003833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a51f15d04d4d441a5609c8ba8000000546736670fe5ee") [ 1786.793866][ T26] audit: type=1400 audit(1557263858.730:36528): avc: denied { map } for pid=21276 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1786.962465][ T26] audit: type=1400 audit(1557263858.730:36529): avc: denied { map } for pid=21276 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1787.190785][ T26] audit: type=1400 audit(1557263858.820:36530): avc: denied { map } for pid=21276 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1787.368051][ T26] audit: type=1400 audit(1557263858.880:36531): avc: denied { map } for pid=21276 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:39 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00'}) [ 1787.588018][ T26] audit: type=1400 audit(1557263858.880:36532): avc: denied { map } for pid=21276 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1787.752743][ T26] audit: type=1400 audit(1557263858.930:36533): avc: denied { map } for pid=21276 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1787.909390][ T26] audit: type=1400 audit(1557263858.930:36534): avc: denied { map } for pid=21276 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x4ff, &(0x7f0000000340)=[&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000380), 0x0) [ 1788.088130][ T26] audit: type=1400 audit(1557263858.960:36535): avc: denied { ioctl } for pid=21277 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:17:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, {}, 0xffffffffffffff87}, 0xffffffffffffffab) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="f2af91930f0124eda133fa20430fbafce852f6618890c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340aec423b549d8535b955f420f383c02c401405c6bfdd70fc7f833fec421d5e234bbab6464660f38323c4c8f8fdbc1a1fe5ff6f6df0804f4c4a5b3609c0f01c4288ba6452e00005480") 21:17:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x100000000001, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0xfffffffffffffffb}, 0x8) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @rand_addr="9c82c51ad9b938c897572eaaa0daa713"}], 0x1c) 21:17:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="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") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 21:17:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 21:17:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x4ff, &(0x7f0000000340)=[&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000380), 0x0) 21:17:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 21:17:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, {}, 0xffffffffffffff87}, 0xffffffffffffffab) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="f2af91930f0124eda133fa20430fbafce852f6618890c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340aec423b549d8535b955f420f383c02c401405c6bfdd70fc7f833fec421d5e234bbab6464660f38323c4c8f8fdbc1a1fe5ff6f6df0804f4c4a5b3609c0f01c4288ba6452e00005480") 21:17:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 21:17:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x4ff, &(0x7f0000000340)=[&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000380), 0x0) 21:17:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 21:17:43 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 21:17:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) [ 1791.479693][ T26] kauditd_printk_skb: 142 callbacks suppressed [ 1791.479710][ T26] audit: type=1400 audit(1557263863.690:36678): avc: denied { map } for pid=21837 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1791.708013][ T26] audit: type=1400 audit(1557263863.730:36679): avc: denied { map } for pid=21837 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x4ff, &(0x7f0000000340)=[&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000380), 0x0) [ 1791.853303][ T26] audit: type=1400 audit(1557263863.760:36680): avc: denied { ioctl } for pid=21849 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1792.119620][ T26] audit: type=1400 audit(1557263863.790:36681): avc: denied { map } for pid=21847 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, {}, 0xffffffffffffff87}, 0xffffffffffffffab) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="f2af91930f0124eda133fa20430fbafce852f6618890c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340aec423b549d8535b955f420f383c02c401405c6bfdd70fc7f833fec421d5e234bbab6464660f38323c4c8f8fdbc1a1fe5ff6f6df0804f4c4a5b3609c0f01c4288ba6452e00005480") [ 1792.269286][ T26] audit: type=1400 audit(1557263863.820:36682): avc: denied { map } for pid=21837 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1792.425079][ T26] audit: type=1400 audit(1557263863.820:36683): avc: denied { map } for pid=21837 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) [ 1792.598448][ T26] audit: type=1400 audit(1557263863.840:36684): avc: denied { map } for pid=21847 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1792.775880][ T26] audit: type=1400 audit(1557263863.850:36685): avc: denied { map } for pid=21847 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) [ 1792.988466][ T26] audit: type=1400 audit(1557263863.920:36686): avc: denied { map } for pid=21847 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) [ 1793.149368][ T26] audit: type=1400 audit(1557263863.920:36687): avc: denied { map } for pid=21847 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 21:17:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 21:17:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x18, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local}, @in6=@remote}}}, 0xf8}}, 0x0) 21:17:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\xc2(t\xf56c\xf71E\x9e\x90\xac\xa4\x19\x7f\xa1\xb8\x02x9\xff0\x7f\x94\xa7\xbeX\xd2\xed\x0e^>@\xaf\x11c\xce19\xf5\xf8\xd3\x19k\x1d\xa5\x99\x89\xb4=\x1b\xde\x88g\xf4\xadi\xef\xbe\x13\xaaU\xdc\xdcw\r\xe1 jy8\n%\xde\x86\xb8ExAkCBp\x18/\x80W.[\r\x13\xc0e\x8f9i\xc5\x95\xca\xd1\xba&?\xe65}\xe9\nl\xb4b\xa7\x9dH\"\xf3\xaa>4\xe9A$\xf9\x04\xeb\xd5\x00\xb7,\x80\x1a\xaf\xbeP\f\xec\xa8\xc1l\xbb\xe9\xc2\x01\xe7\xf4mD\x80m\xc2\xbd|\x06\b\xd2\xc9\xdb\xcb\x83\xb2\xda\xa7\xc5\xf1J\xd2\xf7i\x95\xb7\xc0\xf4nEU.\x0e\x9b\xb6\x87\x13\xd5\xa8\x7f\x16\xc3\xac\x9d,\xa24>9\xa46\x8c\x7f\x00\x00\x00\x00\x00\x00\x00\x04\xf6\x8f\x0e|\xa0|\x8aw\x87\x9f\xec\xebQ\xa2\xf4[3\xdeF\xce\xf2\xb4\xf9H@\xce8\xe4\xf8\xd3\xf0', 0x200002, 0x0) fchdir(r1) syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="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") preadv(r0, &(0x7f0000000180), 0x0, 0x50) 21:17:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 21:17:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x18, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local}, @in6=@remote}}}, 0xf8}}, 0x0) 21:17:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 21:17:47 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0x600000)=nil, 0x602209, 0x4, 0x4002011, r1, 0x0) 21:17:48 executing program 5: syz_execute_func(&(0x7f0000000300)="915d420d29d0f05a5aab4b4be2f9c4e1f573df3da0ed287fc10000000026430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccdc4e37d099300000100b24eaf673e0facce48510000009664660fdaf0458004ea00660f50e38f691801ae0c000000") socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) write$P9_RMKDIR(r0, &(0x7f0000000180)={0xfffffffffffffe40, 0x49, 0xffffffffffffffff, {0x0, 0x3, 0x1}}, 0x14) sendfile(r0, r1, 0x0, 0x10000) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") 21:17:48 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) [ 1796.494316][ T26] kauditd_printk_skb: 147 callbacks suppressed [ 1796.494333][ T26] audit: type=1400 audit(1557263868.700:36835): avc: denied { map } for pid=22391 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x18, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local}, @in6=@remote}}}, 0xf8}}, 0x0) [ 1796.668056][ T26] audit: type=1400 audit(1557263868.720:36836): avc: denied { map } for pid=22391 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1796.843144][ T26] audit: type=1400 audit(1557263868.750:36837): avc: denied { map } for pid=22393 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1797.026826][ T26] audit: type=1400 audit(1557263868.840:36838): avc: denied { map } for pid=22393 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) [ 1797.249180][ T26] audit: type=1400 audit(1557263868.850:36839): avc: denied { map } for pid=22393 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1797.394663][ T26] audit: type=1400 audit(1557263868.910:36840): avc: denied { map } for pid=22393 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0x4, 0x8, 0x4c4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) [ 1797.536285][ T26] audit: type=1400 audit(1557263868.910:36841): avc: denied { map } for pid=22393 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) [ 1797.678878][ T26] audit: type=1400 audit(1557263868.970:36842): avc: denied { ioctl } for pid=22433 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:17:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0xf8, 0x18, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local}, @in6=@remote}}}, 0xf8}}, 0x0) 21:17:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x1a1, 0x0}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c2350093eaccab39fd5bf9e2f9470f1d1497c7e4c65849dbd5014cb63a3af4a95bf9c44149c87f168f4808eebce00000802000ad1111e16d34e60f18674665657c7c730fc48219b9741100664f0f3a6030068f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005491") [ 1797.879766][ T26] audit: type=1400 audit(1557263869.040:36843): avc: denied { ioctl } for pid=22433 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1798.054922][ T26] audit: type=1400 audit(1557263869.170:36844): avc: denied { ioctl } for pid=22488 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:17:50 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="994a2ae92c10964c0f05bf03000000c4a37bf0c50141e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79ce66469ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 21:17:51 executing program 2: syz_execute_func(&(0x7f0000000280)="b1ee91cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2160f01c4c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000480)="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") 21:17:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x38}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f964f2410f38f022c7e4c653fb0fc4014cb63a3a62a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c000000007e41a5609c8ba800000054c4e2750c9a0e000000") 21:17:52 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockname$llc(r0, 0x0, 0x0) 21:17:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) 21:17:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:17:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) 21:17:53 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/65, 0x18) 21:17:53 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="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") 21:17:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x1a1, 0x0}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c2350093eaccab39fd5bf9e2f9470f1d1497c7e4c65849dbd5014cb63a3af4a95bf9c44149c87f168f4808eebce00000802000ad1111e16d34e60f18674665657c7c730fc48219b9741100664f0f3a6030068f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005491") [ 1801.615386][ T26] kauditd_printk_skb: 135 callbacks suppressed [ 1801.615403][ T26] audit: type=1400 audit(1557263873.820:36980): avc: denied { map } for pid=23244 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1801.790341][ T26] audit: type=1400 audit(1557263873.840:36981): avc: denied { map } for pid=23244 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1801.937294][ T26] audit: type=1400 audit(1557263873.860:36982): avc: denied { map } for pid=23244 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.079792][ T26] audit: type=1400 audit(1557263873.870:36983): avc: denied { map } for pid=23244 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:54 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) [ 1802.247304][ T26] audit: type=1400 audit(1557263873.930:36984): avc: denied { ioctl } for pid=23246 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:17:54 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/65, 0x18) [ 1802.407457][ T26] audit: type=1400 audit(1557263873.940:36985): avc: denied { map } for pid=23244 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.522127][ T26] audit: type=1400 audit(1557263873.980:36986): avc: denied { map } for pid=23244 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.728428][ T26] audit: type=1400 audit(1557263873.980:36987): avc: denied { map } for pid=23244 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.928328][ T26] audit: type=1400 audit(1557263874.040:36988): avc: denied { ioctl } for pid=23246 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:17:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x38}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f964f2410f38f022c7e4c653fb0fc4014cb63a3a62a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c000000007e41a5609c8ba800000054c4e2750c9a0e000000") 21:17:55 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="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") 21:17:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1803.154987][ T26] audit: type=1400 audit(1557263874.090:36989): avc: denied { map } for pid=23244 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:55 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) 21:17:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x1a1, 0x0}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c2350093eaccab39fd5bf9e2f9470f1d1497c7e4c65849dbd5014cb63a3af4a95bf9c44149c87f168f4808eebce00000802000ad1111e16d34e60f18674665657c7c730fc48219b9741100664f0f3a6030068f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005491") 21:17:56 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/65, 0x18) 21:17:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:17:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x38}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f964f2410f38f022c7e4c653fb0fc4014cb63a3a62a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c000000007e41a5609c8ba800000054c4e2750c9a0e000000") 21:17:57 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="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") 21:17:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x1a1, 0x0}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c2350093eaccab39fd5bf9e2f9470f1d1497c7e4c65849dbd5014cb63a3af4a95bf9c44149c87f168f4808eebce00000802000ad1111e16d34e60f18674665657c7c730fc48219b9741100664f0f3a6030068f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005491") 21:17:57 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/65, 0x18) 21:17:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1806.631668][ T26] kauditd_printk_skb: 182 callbacks suppressed [ 1806.631685][ T26] audit: type=1400 audit(1557263878.840:37172): avc: denied { map } for pid=23890 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1806.839316][ T26] audit: type=1400 audit(1557263878.850:37173): avc: denied { map } for pid=23894 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x38}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c42c7dab39fd5bf9e2f964f2410f38f022c7e4c653fb0fc4014cb63a3a62a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee46b7c730f66400f383366261c0d01fe5ff6e7df660fe7af5cc34a51c4026d90947c000000007e41a5609c8ba800000054c4e2750c9a0e000000") [ 1806.983432][ T26] audit: type=1400 audit(1557263878.880:37174): avc: denied { map } for pid=23890 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1807.144267][ T26] audit: type=1400 audit(1557263878.880:37175): avc: denied { map } for pid=23854 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1807.390623][ T26] audit: type=1400 audit(1557263878.880:37176): avc: denied { map } for pid=23854 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:17:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:17:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1807.577937][ T26] audit: type=1400 audit(1557263878.880:37177): avc: denied { map } for pid=23894 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1807.748010][ T26] audit: type=1400 audit(1557263878.900:37178): avc: denied { map } for pid=23890 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1807.971103][ T26] audit: type=1400 audit(1557263878.910:37179): avc: denied { map } for pid=23894 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.115588][ T26] audit: type=1400 audit(1557263878.920:37180): avc: denied { map } for pid=23890 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:18:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1808.299101][ T26] audit: type=1400 audit(1557263878.930:37181): avc: denied { map } for pid=23894 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:18:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1811.641252][ T26] kauditd_printk_skb: 154 callbacks suppressed [ 1811.641269][ T26] audit: type=1400 audit(1557263883.850:37330): avc: denied { map } for pid=24536 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1811.824729][ T26] audit: type=1400 audit(1557263883.900:37331): avc: denied { map } for pid=24536 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1811.997657][ T26] audit: type=1400 audit(1557263883.950:37332): avc: denied { map } for pid=24536 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.178242][ T26] audit: type=1400 audit(1557263884.000:37333): avc: denied { ioctl } for pid=24557 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1812.392822][ T26] audit: type=1400 audit(1557263884.020:37334): avc: denied { map } for pid=24536 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.615488][ T26] audit: type=1400 audit(1557263884.020:37335): avc: denied { map } for pid=24536 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:18:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1812.801377][ T26] audit: type=1400 audit(1557263884.060:37336): avc: denied { map } for pid=24561 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.946867][ T26] audit: type=1400 audit(1557263884.060:37337): avc: denied { map } for pid=24561 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:18:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1813.132694][ T26] audit: type=1400 audit(1557263884.080:37338): avc: denied { ioctl } for pid=24557 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1813.309927][ T26] audit: type=1400 audit(1557263884.080:37339): avc: denied { map } for pid=24561 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:18:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1816.653946][ T26] kauditd_printk_skb: 134 callbacks suppressed [ 1816.653976][ T26] audit: type=1400 audit(1557263888.860:37474): avc: denied { ioctl } for pid=25482 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 21:18:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1816.878028][ T26] audit: type=1400 audit(1557263888.930:37475): avc: denied { ioctl } for pid=25482 comm="syz-executor.2" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1817.097992][ T26] audit: type=1400 audit(1557263888.940:37476): avc: denied { map } for pid=25397 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.269863][ T26] audit: type=1400 audit(1557263888.940:37477): avc: denied { map } for pid=25397 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.468026][ T26] audit: type=1400 audit(1557263889.010:37478): avc: denied { map } for pid=25397 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.695127][ T26] audit: type=1400 audit(1557263889.010:37479): avc: denied { map } for pid=25397 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:18:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/65, 0x18) [ 1817.932446][ T26] audit: type=1400 audit(1557263889.430:37480): avc: denied { map } for pid=25508 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1818.111469][ T26] audit: type=1400 audit(1557263889.440:37481): avc: denied { map } for pid=25508 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1818.256741][ T26] audit: type=1400 audit(1557263889.460:37482): avc: denied { map } for pid=25508 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:18:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1818.440982][ T26] audit: type=1400 audit(1557263889.470:37483): avc: denied { map } for pid=25508 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:18:10 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="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") 21:18:11 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="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") 21:18:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x1000, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000020000000000000003000000ff0100000400000000000000ff07000000000000ffffffff0000000001800000000004000000ee0000000000000000000000000000040000000000000000000000000000ff0700000000000009000000000000000700000000000000000000000000000000000000000000000008000000000000000000000000000006000000000000000bc800000000000002000000000000000000001000000000000000000000000002040000000000000000000000000000050000000000000009000000003b0000b84e00"/240]) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000002c0)=0x1c) sendto(r1, &(0x7f00000004c0)="333563e85f0f55142971bfe4a17a9d4f615b5ada46222fc42162b9de9d43d28e20dba90c9f3e1f1a8c1772cdb5b5be0f548a4175971fcf3c98e9e68f483cd29aa08a3746f2a050efcd7cb58d0363fe2b188308c5e404060ba609ff33681584e60c7842359bde898d71f48b8170102220c8b9319043c5921ed8619c75bc47d1b4c24219ed8831c91d09e8be6182", 0x8d, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$peekuser(0x3, r3, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x33b) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000180)=0xb0e, 0x4) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="73656375726974790001000000000000c5871d150a10a99f7b0c95a600000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a83a05e50676dc1ab2048bbd1b79c066e53fe8b1769e3cb88b81857dfada800d616d7735db7d78ef0b7a2dacefbe8730e7331ec64199221099e3ceb9b4c3306bb4534310ed26472a34b7399d590131aba39a7a46fb21eecd2a2592b62c6cc9867a7a92d9d50772fcaac648a58b55f16f04dbdd7d035cd32d"], 0x1) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 21:18:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/65, 0x18) 21:18:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="f259af6544813f00000000c4e1c65d2f0f0124eda133fa20430fbafce852f7619bd0c4ab5bf9e2f99797e21da7df0f982408f0410fabb200000000014cb63a527a6dc463f91756bd53f749f2168f4808ee208c46d9f34580e60f186746f340ae7c730f66400f66420f383259e04583760406e4a1305577410fefa900000000f6e7dfc441a5609c8ba80000005499") 21:18:12 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="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") 21:18:13 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="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") 21:18:13 executing program 4: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000003c0)='\'', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x82) dup2(r1, r0) write$sndseq(r0, &(0x7f0000e6ffd0)=[{0x5, 0x0, 0x0, 0x3fd, @time}], 0x30) 21:18:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/65, 0x18) 21:18:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/unix\x00') preadv(r0, &(0x7f0000000140), 0x345, 0x0) [ 1821.680340][ T26] kauditd_printk_skb: 182 callbacks suppressed [ 1821.680358][ T26] audit: type=1400 audit(1557263893.890:37667): avc: denied { map } for pid=26156 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1821.914654][ T26] audit: type=1400 audit(1557263893.890:37668): avc: denied { map } for pid=26156 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1822.188286][ T26] audit: type=1400 audit(1557263893.870:37666): avc: denied { map } for pid=26160 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:18:14 executing program 4: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000003c0)='\'', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x82) dup2(r1, r0) write$sndseq(r0, &(0x7f0000e6ffd0)=[{0x5, 0x0, 0x0, 0x3fd, @time}], 0x30) [ 1822.374933][ T26] audit: type=1400 audit(1557263893.940:37669): avc: denied { map } for pid=26160 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:18:14 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="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") [ 1822.594837][ T26] audit: type=1400 audit(1557263893.970:37671): avc: denied { map } for pid=26178 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1822.696141][T26346] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1822.707919][T26280] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1822.770237][T26346] audit: audit_lost=201 audit_rate_limit=0 audit_backlog_limit=64 [ 1822.782237][T26280] audit: audit_lost=202 audit_rate_limit=0 audit_backlog_limit=64 [ 1822.792084][ T26] audit: type=1400 audit(1557263893.990:37672): avc: denied { map } for pid=26178 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 21:18:15 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="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") 21:18:15 executing program 2: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000003c0)='\'', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x82) dup2(r1, r0) write$sndseq(r0, &(0x7f0000e6ffd0)=[{0x5, 0x0, 0x0, 0x3fd, @time}], 0x30) 21:18:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="f259af6544813f00000000c4e1c65d2f0f0124eda133fa20430fbafce852f7619bd0c4ab5bf9e2f99797e21da7df0f982408f0410fabb200000000014cb63a527a6dc463f91756bd53f749f2168f4808ee208c46d9f34580e60f186746f340ae7c730f66400f66420f383259e04583760406e4a1305577410fefa900000000f6e7dfc441a5609c8ba80000005499") 21:18:15 executing program 4: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000003c0)='\'', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x82) dup2(r1, r0) write$sndseq(r0, &(0x7f0000e6ffd0)=[{0x5, 0x0, 0x0, 0x3fd, @time}], 0x30) 21:18:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/unix\x00') preadv(r0, &(0x7f0000000140), 0x345, 0x0) 21:18:16 executing program 2: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000003c0)='\'', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x82) dup2(r1, r0) write$sndseq(r0, &(0x7f0000e6ffd0)=[{0x5, 0x0, 0x0, 0x3fd, @time}], 0x30) 21:18:16 executing program 4: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000003c0)='\'', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x82) dup2(r1, r0) write$sndseq(r0, &(0x7f0000e6ffd0)=[{0x5, 0x0, 0x0, 0x3fd, @time}], 0x30) 21:18:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14, r1, 0x11}, 0x14}}, 0x0) 21:18:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000fffffffb) 21:18:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="f259af6544813f00000000c4e1c65d2f0f0124eda133fa20430fbafce852f7619bd0c4ab5bf9e2f99797e21da7df0f982408f0410fabb200000000014cb63a527a6dc463f91756bd53f749f2168f4808ee208c46d9f34580e60f186746f340ae7c730f66400f66420f383259e04583760406e4a1305577410fefa900000000f6e7dfc441a5609c8ba80000005499") 21:18:17 executing program 2: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f00000003c0)='\'', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x82) dup2(r1, r0) write$sndseq(r0, &(0x7f0000e6ffd0)=[{0x5, 0x0, 0x0, 0x3fd, @time}], 0x30) 21:18:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/unix\x00') preadv(r0, &(0x7f0000000140), 0x345, 0x0) 21:18:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xe, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3, 0x6, 0x0, 0x1, 0x2}]}, &(0x7f0000f6bffb)='GPL\x00', 0xffffffffffffffff, 0x79e, &(0x7f00001a7f05)=""/251}, 0x48) 21:18:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000000c0)=@routing={0x0, 0x0, 0x2}, 0x8) 21:18:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) [ 1826.766150][ T26] kauditd_printk_skb: 226 callbacks suppressed [ 1826.766163][ T26] audit: type=1400 audit(1557263898.970:37893): avc: denied { prog_run } for pid=26919 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 21:18:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/unix\x00') preadv(r0, &(0x7f0000000140), 0x345, 0x0) [ 1826.928452][ T3482] WARNING: CPU: 1 PID: 3482 at kernel/bpf/core.c:853 bpf_jit_free+0x157/0x1b0 [ 1826.937609][ T3482] Kernel panic - not syncing: panic_on_warn set ... [ 1826.944215][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1826.951441][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1826.961516][ T3482] Workqueue: events bpf_prog_free_deferred [ 1826.967320][ T3482] Call Trace: [ 1826.970708][ T3482] dump_stack+0x172/0x1f0 [ 1826.975066][ T3482] ? bpf_jit_free+0xb0/0x1b0 [ 1826.979708][ T3482] panic+0x2cb/0x65c [ 1826.983708][ T3482] ? __warn_printk+0xf3/0xf3 [ 1826.988361][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1826.996076][ T3482] #PF: supervisor read access in kernel mode [ 1827.002059][ T3482] #PF: error_code(0x0000) - not-present page [ 1827.008037][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1827.015591][ T3482] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1827.020784][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1827.028003][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1827.038055][ T3482] Workqueue: events bpf_prog_free_deferred [ 1827.043873][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1827.050034][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1827.069646][ T3482] RSP: 0018:ffff88809bbd7850 EFLAGS: 00010806 [ 1827.075732][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1827.083702][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1827.091671][ T3482] RBP: ffff88809bbd7890 R08: ffff88809bbe60c0 R09: ffffed1015d26be0 [ 1827.099633][ T3482] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff88806a3c9338 [ 1827.107592][ T3482] R13: dffffc0000000000 R14: ffffffffffffffff R15: ffff88806a3c9338 [ 1827.115582][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1827.124503][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1827.131078][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1827.139039][ T3482] Call Trace: [ 1827.142368][ T3482] ? rcu_rnp_online_cpus+0x1/0x40 [ 1827.147393][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1827.155133][ T3482] #PF: supervisor read access in kernel mode [ 1827.161102][ T3482] #PF: error_code(0x0000) - not-present page [ 1827.167081][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1827.174627][ T3482] Oops: 0000 [#2] PREEMPT SMP KASAN [ 1827.179823][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1827.187002][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1827.197088][ T3482] Workqueue: events bpf_prog_free_deferred [ 1827.202915][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1827.209109][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1827.228709][ T3482] RSP: 0018:ffff88809bbd7378 EFLAGS: 00010806 [ 1827.234780][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1827.242744][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1827.250707][ T3482] RBP: ffff88809bbd73b8 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1827.258675][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1827.266639][ T3482] R13: dffffc0000000000 R14: ffffffffffffffff R15: ffff88806a3c9338 [ 1827.274619][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1827.283547][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1827.290148][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1827.292368][ T26] audit: type=1400 audit(1557263899.070:37894): avc: denied { prog_load } for pid=26919 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1827.298121][ T3482] Call Trace: [ 1827.298146][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1827.298159][ T3482] #PF: supervisor read access in kernel mode [ 1827.338613][ T3482] #PF: error_code(0x0000) - not-present page [ 1827.344574][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1827.352119][ T3482] Oops: 0000 [#3] PREEMPT SMP KASAN [ 1827.357306][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1827.357940][ T26] audit: type=1400 audit(1557263899.090:37895): avc: denied { prog_run } for pid=26919 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1827.364498][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1827.397975][ T3482] Workqueue: events bpf_prog_free_deferred [ 1827.403779][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1827.409928][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1827.417906][ T26] audit: type=1400 audit(1557263899.100:37896): avc: denied { map } for pid=26967 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.429519][ T3482] RSP: 0018:ffff88809bbd6e98 EFLAGS: 00010806 [ 1827.429539][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1827.429545][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1827.429558][ T3482] RBP: ffff88809bbd6ed8 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1827.455887][ T26] audit: type=1400 audit(1557263899.120:37897): avc: denied { map } for pid=26967 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.458401][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1827.458407][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1827.458415][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1827.458427][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1827.466403][ T26] audit: type=1400 audit(1557263899.140:37898): avc: denied { ioctl } for pid=27028 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1827.474338][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1827.474346][ T3482] Call Trace: [ 1827.474390][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1827.482376][ T26] audit: type=1400 audit(1557263899.140:37899): avc: denied { ioctl } for pid=27028 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15740 ioctlcmd=0x6364 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipmi_device_t:s0 tclass=file permissive=1 [ 1827.505138][ T3482] #PF: supervisor read access in kernel mode [ 1827.505144][ T3482] #PF: error_code(0x0000) - not-present page [ 1827.505149][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1827.527884][ T26] audit: type=1400 audit(1557263899.140:37900): avc: denied { map } for pid=26967 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.530044][ T3482] Oops: 0000 [#4] PREEMPT SMP KASAN [ 1827.536625][ T26] audit: type=1400 audit(1557263899.140:37901): avc: denied { map } for pid=26967 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.564974][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1827.564982][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1827.565008][ T3482] Workqueue: events bpf_prog_free_deferred [ 1827.617899][ T26] audit: type=1400 audit(1557263899.140:37902): avc: denied { map } for pid=26967 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.618753][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1827.739327][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1827.758934][ T3482] RSP: 0018:ffff88809bbd69b8 EFLAGS: 00010806 [ 1827.765026][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1827.773010][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1827.781004][ T3482] RBP: ffff88809bbd69f8 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1827.788990][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1827.796975][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1827.804957][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1827.813992][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1827.820582][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1827.828555][ T3482] Call Trace: [ 1827.831857][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1827.839566][ T3482] #PF: supervisor read access in kernel mode [ 1827.845545][ T3482] #PF: error_code(0x0000) - not-present page [ 1827.851504][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1827.859046][ T3482] Oops: 0000 [#5] PREEMPT SMP KASAN [ 1827.864234][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1827.871414][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1827.881493][ T3482] Workqueue: events bpf_prog_free_deferred [ 1827.887305][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1827.893468][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1827.913079][ T3482] RSP: 0018:ffff88809bbd64d8 EFLAGS: 00010806 [ 1827.919150][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1827.927128][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1827.935129][ T3482] RBP: ffff88809bbd6518 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1827.943099][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1827.951071][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1827.959070][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1827.968059][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1827.974640][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1827.982612][ T3482] Call Trace: [ 1827.985923][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1827.993656][ T3482] #PF: supervisor read access in kernel mode [ 1827.999623][ T3482] #PF: error_code(0x0000) - not-present page [ 1828.005587][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1828.013144][ T3482] Oops: 0000 [#6] PREEMPT SMP KASAN [ 1828.018345][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1828.025551][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1828.035629][ T3482] Workqueue: events bpf_prog_free_deferred [ 1828.041452][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1828.047604][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1828.067217][ T3482] RSP: 0018:ffff88809bbd5ff8 EFLAGS: 00010806 [ 1828.073302][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1828.081274][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1828.089249][ T3482] RBP: ffff88809bbd6038 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1828.097224][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1828.105202][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1828.113202][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1828.122155][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1828.128742][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1828.136711][ T3482] Call Trace: [ 1828.140039][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1828.147740][ T3482] #PF: supervisor read access in kernel mode [ 1828.153740][ T3482] #PF: error_code(0x0000) - not-present page [ 1828.159722][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1828.167272][ T3482] Oops: 0000 [#7] PREEMPT SMP KASAN [ 1828.172463][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1828.179658][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1828.189727][ T3482] Workqueue: events bpf_prog_free_deferred [ 1828.195529][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1828.201677][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1828.221282][ T3482] RSP: 0018:ffff88809bbd5b18 EFLAGS: 00010806 [ 1828.227350][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1828.235324][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1828.243289][ T3482] RBP: ffff88809bbd5b58 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1828.251258][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1828.259255][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1828.267235][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1828.276186][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1828.282767][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1828.290733][ T3482] Call Trace: [ 1828.294032][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1828.301748][ T3482] #PF: supervisor read access in kernel mode [ 1828.307712][ T3482] #PF: error_code(0x0000) - not-present page [ 1828.313704][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1828.321256][ T3482] Oops: 0000 [#8] PREEMPT SMP KASAN [ 1828.326442][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1828.333635][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1828.343705][ T3482] Workqueue: events bpf_prog_free_deferred [ 1828.349529][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1828.355678][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1828.375274][ T3482] RSP: 0018:ffff88809bbd5638 EFLAGS: 00010806 [ 1828.381348][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1828.389348][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1828.397342][ T3482] RBP: ffff88809bbd5678 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1828.405301][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1828.413255][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1828.421230][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1828.430147][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1828.436712][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1828.444668][ T3482] Call Trace: [ 1828.447954][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1828.455659][ T3482] #PF: supervisor read access in kernel mode [ 1828.461617][ T3482] #PF: error_code(0x0000) - not-present page [ 1828.467578][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1828.475137][ T3482] Oops: 0000 [#9] PREEMPT SMP KASAN [ 1828.480336][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1828.487509][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1828.497575][ T3482] Workqueue: events bpf_prog_free_deferred [ 1828.503484][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1828.509655][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1828.529262][ T3482] RSP: 0018:ffff88809bbd5158 EFLAGS: 00010806 [ 1828.535320][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1828.543285][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1828.551249][ T3482] RBP: ffff88809bbd5198 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1828.559229][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1828.567193][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1828.575173][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1828.584975][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1828.591548][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1828.599531][ T3482] Call Trace: [ 1828.602829][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1828.610543][ T3482] #PF: supervisor read access in kernel mode [ 1828.616512][ T3482] #PF: error_code(0x0000) - not-present page [ 1828.622473][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1828.630039][ T3482] Oops: 0000 [#10] PREEMPT SMP KASAN [ 1828.635310][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1828.642496][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1828.652552][ T3482] Workqueue: events bpf_prog_free_deferred [ 1828.658351][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1828.664495][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1828.684609][ T3482] RSP: 0018:ffff88809bbd4c78 EFLAGS: 00010806 [ 1828.690669][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1828.698633][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1828.706600][ T3482] RBP: ffff88809bbd4cb8 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1828.714554][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1828.722506][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1828.730460][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1828.739949][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1828.746535][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1828.754490][ T3482] Call Trace: [ 1828.757786][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1828.765505][ T3482] #PF: supervisor read access in kernel mode [ 1828.771482][ T3482] #PF: error_code(0x0000) - not-present page [ 1828.777439][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1828.784980][ T3482] Oops: 0000 [#11] PREEMPT SMP KASAN [ 1828.790252][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1828.797442][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1828.807509][ T3482] Workqueue: events bpf_prog_free_deferred [ 1828.813337][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1828.819497][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1828.839111][ T3482] RSP: 0018:ffff88809bbd4798 EFLAGS: 00010806 [ 1828.845177][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1828.853149][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1828.861111][ T3482] RBP: ffff88809bbd47d8 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1828.869074][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1828.877148][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1828.885122][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1828.894037][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1828.900606][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1828.908562][ T3482] Call Trace: [ 1828.911853][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1828.919552][ T3482] #PF: supervisor read access in kernel mode [ 1828.925517][ T3482] #PF: error_code(0x0000) - not-present page [ 1828.931488][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1828.939032][ T3482] Oops: 0000 [#12] PREEMPT SMP KASAN [ 1828.944312][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1828.951487][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1828.961535][ T3482] Workqueue: events bpf_prog_free_deferred [ 1828.967327][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1828.973468][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1828.993100][ T3482] RSP: 0018:ffff88809bbd42b8 EFLAGS: 00010806 [ 1828.999158][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1829.007138][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1829.015104][ T3482] RBP: ffff88809bbd42f8 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1829.023074][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1829.031045][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1829.039022][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1829.047936][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1829.054511][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1829.062481][ T3482] Call Trace: [ 1829.065769][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1829.073484][ T3482] #PF: supervisor read access in kernel mode [ 1829.079443][ T3482] #PF: error_code(0x0000) - not-present page [ 1829.085398][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1829.092948][ T3482] Oops: 0000 [#13] PREEMPT SMP KASAN [ 1829.098235][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1829.105426][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1829.115480][ T3482] Workqueue: events bpf_prog_free_deferred [ 1829.121282][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1829.127437][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1829.147026][ T3482] RSP: 0018:ffff88809bbd3dd8 EFLAGS: 00010806 [ 1829.153125][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1829.161081][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1829.169051][ T3482] RBP: ffff88809bbd3e18 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1829.177015][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1829.185003][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1829.192982][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1829.201895][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1829.208478][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1829.216432][ T3482] Call Trace: [ 1829.219731][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1829.227433][ T3482] #PF: supervisor read access in kernel mode [ 1829.233420][ T3482] #PF: error_code(0x0000) - not-present page [ 1829.239379][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1829.246927][ T3482] Oops: 0000 [#14] PREEMPT SMP KASAN [ 1829.252214][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1829.259411][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1829.269474][ T3482] Workqueue: events bpf_prog_free_deferred [ 1829.275281][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1829.281427][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1829.301026][ T3482] RSP: 0018:ffff88809bbd38f8 EFLAGS: 00010806 [ 1829.307084][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1829.315050][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1829.323026][ T3482] RBP: ffff88809bbd3938 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1829.330998][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1829.338963][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1829.346946][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1829.355877][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1829.362452][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1829.370407][ T3482] Call Trace: [ 1829.373697][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1829.381418][ T3482] #PF: supervisor read access in kernel mode [ 1829.387371][ T3482] #PF: error_code(0x0000) - not-present page [ 1829.393334][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1829.400870][ T3482] Oops: 0000 [#15] PREEMPT SMP KASAN [ 1829.406133][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1829.413303][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1829.423351][ T3482] Workqueue: events bpf_prog_free_deferred [ 1829.429164][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1829.435299][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1829.454881][ T3482] RSP: 0018:ffff88809bbd3418 EFLAGS: 00010806 [ 1829.460939][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1829.468908][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1829.476869][ T3482] RBP: ffff88809bbd3458 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1829.484848][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1829.492819][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1829.500783][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1829.509700][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1829.516273][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1829.524236][ T3482] Call Trace: [ 1829.527533][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1829.535240][ T3482] #PF: supervisor read access in kernel mode [ 1829.541215][ T3482] #PF: error_code(0x0000) - not-present page [ 1829.547179][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1829.554733][ T3482] Oops: 0000 [#16] PREEMPT SMP KASAN [ 1829.560023][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1829.567198][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1829.577478][ T3482] Workqueue: events bpf_prog_free_deferred [ 1829.583284][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1829.589429][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1829.609047][ T3482] RSP: 0018:ffff88809bbd2f38 EFLAGS: 00010806 [ 1829.615105][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1829.623070][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1829.631031][ T3482] RBP: ffff88809bbd2f78 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1829.638995][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1829.646984][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1829.654957][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1829.663890][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1829.670469][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1829.678942][ T3482] Call Trace: [ 1829.682253][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1829.689978][ T3482] #PF: supervisor read access in kernel mode [ 1829.695978][ T3482] #PF: error_code(0x0000) - not-present page [ 1829.701960][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1829.709514][ T3482] Oops: 0000 [#17] PREEMPT SMP KASAN [ 1829.714797][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1829.721979][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1829.732039][ T3482] Workqueue: events bpf_prog_free_deferred [ 1829.737843][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1829.744006][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1829.763609][ T3482] RSP: 0018:ffff88809bbd2a58 EFLAGS: 00010806 [ 1829.769660][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1829.777612][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1829.785566][ T3482] RBP: ffff88809bbd2a98 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1829.793540][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1829.801504][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1829.809471][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1829.818388][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1829.824994][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1829.832951][ T3482] Call Trace: [ 1829.836265][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1829.843973][ T3482] #PF: supervisor read access in kernel mode [ 1829.849930][ T3482] #PF: error_code(0x0000) - not-present page [ 1829.855888][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1829.863437][ T3482] Oops: 0000 [#18] PREEMPT SMP KASAN [ 1829.868713][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1829.875894][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1829.885958][ T3482] Workqueue: events bpf_prog_free_deferred [ 1829.891906][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1829.898056][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1829.917649][ T3482] RSP: 0018:ffff88809bbd2578 EFLAGS: 00010806 [ 1829.923702][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1829.931677][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1829.939635][ T3482] RBP: ffff88809bbd25b8 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1829.947594][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1829.955557][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1829.963525][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1829.972456][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1829.979027][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1829.986987][ T3482] Call Trace: [ 1829.990283][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1829.997990][ T3482] #PF: supervisor read access in kernel mode [ 1830.003951][ T3482] #PF: error_code(0x0000) - not-present page [ 1830.009934][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1830.017499][ T3482] Oops: 0000 [#19] PREEMPT SMP KASAN [ 1830.022777][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1830.029963][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.040017][ T3482] Workqueue: events bpf_prog_free_deferred [ 1830.045813][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1830.051961][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1830.071554][ T3482] RSP: 0018:ffff88809bbd2098 EFLAGS: 00010806 [ 1830.077604][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1830.085585][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1830.093544][ T3482] RBP: ffff88809bbd20d8 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1830.101499][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1830.109458][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1830.117423][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1830.126338][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1830.132914][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1830.140866][ T3482] Call Trace: [ 1830.144164][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1830.151862][ T3482] #PF: supervisor read access in kernel mode [ 1830.157820][ T3482] #PF: error_code(0x0000) - not-present page [ 1830.163805][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1830.171352][ T3482] Oops: 0000 [#20] PREEMPT SMP KASAN [ 1830.176624][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1830.183798][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.193875][ T3482] Workqueue: events bpf_prog_free_deferred [ 1830.199682][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1830.205863][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1830.225455][ T3482] RSP: 0018:ffff88809bbd1bb8 EFLAGS: 00010806 [ 1830.231507][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1830.239465][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1830.247431][ T3482] RBP: ffff88809bbd1bf8 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1830.255393][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1830.263383][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1830.271351][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1830.280263][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1830.286833][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1830.294798][ T3482] Call Trace: [ 1830.298096][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1830.305804][ T3482] #PF: supervisor read access in kernel mode [ 1830.311787][ T3482] #PF: error_code(0x0000) - not-present page [ 1830.317752][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1830.325304][ T3482] Oops: 0000 [#21] PREEMPT SMP KASAN [ 1830.330593][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1830.337777][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.347830][ T3482] Workqueue: events bpf_prog_free_deferred [ 1830.353665][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1830.359819][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1830.379456][ T3482] RSP: 0018:ffff88809bbd16d8 EFLAGS: 00010806 [ 1830.385519][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1830.393475][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1830.401437][ T3482] RBP: ffff88809bbd1718 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1830.409402][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1830.417361][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1830.425329][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1830.434248][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1830.440818][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1830.448779][ T3482] Call Trace: [ 1830.452069][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1830.459784][ T3482] #PF: supervisor read access in kernel mode [ 1830.465755][ T3482] #PF: error_code(0x0000) - not-present page [ 1830.471710][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1830.479263][ T3482] Oops: 0000 [#22] PREEMPT SMP KASAN [ 1830.484533][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1830.491708][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.501761][ T3482] Workqueue: events bpf_prog_free_deferred [ 1830.507560][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1830.513711][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1830.533320][ T3482] RSP: 0018:ffff88809bbd11f8 EFLAGS: 00010806 [ 1830.539382][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1830.547347][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1830.555308][ T3482] RBP: ffff88809bbd1238 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1830.563288][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1830.571254][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1830.579218][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1830.588143][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1830.594715][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1830.602686][ T3482] Call Trace: [ 1830.605995][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1830.613726][ T3482] #PF: supervisor read access in kernel mode [ 1830.619707][ T3482] #PF: error_code(0x0000) - not-present page [ 1830.625707][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1830.633263][ T3482] Oops: 0000 [#23] PREEMPT SMP KASAN [ 1830.638540][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1830.645730][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.655791][ T3482] Workqueue: events bpf_prog_free_deferred [ 1830.661596][ T3482] RIP: 0010:bpf_prog_kallsyms_find+0x1a0/0x2c0 [ 1830.667734][ T3482] Code: 75 07 e8 03 16 f5 ff 0f 0b e8 fc 15 f5 ff 48 89 de 4c 89 f7 e8 11 17 f5 ff 49 39 de 72 71 e8 e7 15 f5 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 33 4c 89 f7 [ 1830.687811][ T3482] RSP: 0018:ffff88809bbd0d18 EFLAGS: 00010806 [ 1830.693873][ T3482] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: ffffffff817b5f0f [ 1830.701838][ T3482] RDX: 0000000000000000 RSI: ffffffff817b5f19 RDI: 0000000000000006 [ 1830.709797][ T3482] RBP: ffff88809bbd0d58 R08: ffff88809bbe60c0 R09: 0000000000000001 [ 1830.717761][ T3482] R10: ffffed1015d26bdf R11: ffff88809bbe60c0 R12: ffff88806a3c9338 [ 1830.725729][ T3482] R13: dffffc0000000000 R14: ffffffffffffff01 R15: ffff88806a3c9338 [ 1830.733706][ T3482] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1830.743262][ T3482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1830.749851][ T3482] CR2: fffffbfff4002000 CR3: 000000008a1ed000 CR4: 00000000001406e0 [ 1830.757825][ T3482] Call Trace: [ 1830.761135][ T3482] BUG: unable to handle page fault for address: fffffbfff4002000 [ 1830.768865][ T3482] #PF: supervisor read access in kernel mode [ 1830.774827][ T3482] #PF: error_code(0x0000) - not-present page [ 1830.780791][ T3482] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 93930067 PTE 0 [ 1830.788367][ T3482] Thread overran stack, or stack corrupted [ 1830.794198][ T3482] Oops: 0000 [#24] PREEMPT SMP KASAN [ 1830.799479][ T3482] CPU: 1 PID: 3482 Comm: kworker/1:2 Not tainted 5.1.0+ #2 [ 1830.806662][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.816802][ T3482] Workqueue: events bpf_prog_free_deferred