&(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8001a0ffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xffffff8d}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2765.587173] attempt to access beyond end of device [ 2765.630657] loop5: rw=4096, want=136, limit=1 16:03:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\xa0\x01\x80\x00'}, &(0x7f0000000080)=0x1e) [ 2765.662021] gfs2: error 10 reading superblock [ 2765.826615] attempt to access beyond end of device [ 2765.852013] loop5: rw=4096, want=136, limit=1 [ 2765.865276] gfs2: error 10 reading superblock 16:03:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) 16:03:07 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x347, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:07 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf0ffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:07 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000200)) r1 = request_key(&(0x7f0000000580)='cifs.spnego\x00', &(0x7f00000008c0)={'syz', 0x1}, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) 16:03:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xfffffff5}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2766.935502] attempt to access beyond end of device 16:03:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) [ 2766.972067] loop5: rw=4096, want=136, limit=1 [ 2767.027859] kauditd_printk_skb: 250 callbacks suppressed [ 2767.027876] audit: type=1400 audit(1563292988.134:94851): avc: denied { map } for pid=9763 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2767.032263] gfs2: error 10 reading superblock 16:03:08 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x100000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2767.043305] audit: type=1400 audit(1563292988.154:94852): avc: denied { map } for pid=9763 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:08 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3a0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f0000000080)=0x1e) [ 2767.402756] audit: type=1400 audit(1563292988.174:94853): avc: denied { map } for pid=9769 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2767.577424] audit: type=1400 audit(1563292988.174:94854): avc: denied { map } for pid=9769 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2767.761964] audit: type=1400 audit(1563292988.174:94855): avc: denied { map } for pid=9769 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1a0ffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2767.950334] audit: type=1400 audit(1563292988.204:94856): avc: denied { map } for pid=9775 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:09 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x200000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2768.102782] audit: type=1400 audit(1563292988.204:94857): avc: denied { map } for pid=9775 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:09 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000200)) r1 = request_key(&(0x7f0000000580)='cifs.spnego\x00', &(0x7f00000008c0)={'syz', 0x1}, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) [ 2768.164698] attempt to access beyond end of device [ 2768.182708] loop5: rw=4096, want=136, limit=1 [ 2768.200837] gfs2: error 10 reading superblock [ 2768.214465] audit: type=1400 audit(1563292988.244:94858): avc: denied { map } for pid=9775 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) shutdown(r0, 0x0) [ 2768.281266] audit: type=1400 audit(1563292988.244:94859): avc: denied { map } for pid=9769 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2768.320253] audit: type=1400 audit(1563292988.264:94860): avc: denied { map } for pid=9775 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2768.417965] attempt to access beyond end of device [ 2768.498789] loop5: rw=4096, want=136, limit=1 [ 2768.531382] gfs2: error 10 reading superblock 16:03:09 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x480, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:10 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x300000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:03:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) shutdown(r0, 0x0) 16:03:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3a0ffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:10 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000200)) r1 = request_key(&(0x7f0000000580)='cifs.spnego\x00', &(0x7f00000008c0)={'syz', 0x1}, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) [ 2769.872455] attempt to access beyond end of device [ 2769.916107] loop5: rw=4096, want=136, limit=2 16:03:11 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x600000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2769.952001] gfs2: error 10 reading superblock 16:03:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) shutdown(r0, 0x0) 16:03:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8000a0ffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:11 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) 16:03:12 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x700000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8001a0ffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:12 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0x0) [ 2771.424272] attempt to access beyond end of device 16:03:12 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) r1 = request_key(&(0x7f0000000580)='cifs.spnego\x00', &(0x7f00000008c0)={'syz', 0x1}, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) [ 2771.471525] loop5: rw=4096, want=136, limit=2 [ 2771.482068] gfs2: error 10 reading superblock [ 2771.592369] attempt to access beyond end of device [ 2771.637790] loop5: rw=4096, want=136, limit=2 [ 2771.645950] gfs2: error 10 reading superblock 16:03:12 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x800000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2772.037553] kauditd_printk_skb: 245 callbacks suppressed [ 2772.037571] audit: type=1400 audit(1563292993.144:95106): avc: denied { map } for pid=9860 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf0ffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2772.197960] audit: type=1400 audit(1563292993.154:95107): avc: denied { map } for pid=9860 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2772.349031] audit: type=1400 audit(1563292993.154:95108): avc: denied { map } for pid=9860 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:13 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0x0) 16:03:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) [ 2772.498108] audit: type=1400 audit(1563292993.204:95109): avc: denied { map } for pid=9857 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2772.674744] audit: type=1400 audit(1563292993.214:95110): avc: denied { map } for pid=9857 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:13 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) r1 = request_key(0x0, &(0x7f00000008c0)={'syz', 0x1}, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) [ 2772.774012] attempt to access beyond end of device [ 2772.779212] loop5: rw=4096, want=136, limit=3 [ 2772.842078] gfs2: error 10 reading superblock [ 2772.872011] audit: type=1400 audit(1563292993.224:95111): avc: denied { map } for pid=9860 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2773.032654] attempt to access beyond end of device 16:03:14 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x806000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2773.056834] loop5: rw=4096, want=136, limit=3 [ 2773.071396] audit: type=1400 audit(1563292993.274:95112): avc: denied { map } for pid=9860 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2773.097847] gfs2: error 10 reading superblock 16:03:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2773.276961] audit: type=1400 audit(1563292993.294:95113): avc: denied { map } for pid=9860 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x100000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2773.442675] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2773.448558] audit: audit_lost=1394 audit_rate_limit=0 audit_backlog_limit=64 16:03:14 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0x0) 16:03:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:03:15 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xd00000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2774.393808] attempt to access beyond end of device [ 2774.398826] loop5: rw=4096, want=136, limit=4 [ 2774.441340] gfs2: error 10 reading superblock 16:03:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x200000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:15 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) 16:03:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:15 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) r1 = request_key(0x0, &(0x7f00000008c0)={'syz', 0x1}, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) 16:03:16 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2000000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x300000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) [ 2775.608843] attempt to access beyond end of device [ 2775.653144] loop5: rw=4096, want=136, limit=16 [ 2775.707046] gfs2: error 10 reading superblock [ 2775.894260] attempt to access beyond end of device [ 2775.899377] loop5: rw=4096, want=136, limit=16 [ 2775.975170] gfs2: error 10 reading superblock 16:03:17 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2200, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:17 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2800000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:17 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) 16:03:17 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) r1 = request_key(0x0, &(0x7f00000008c0)={'syz', 0x1}, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) 16:03:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x600000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 2777.090801] kauditd_printk_skb: 254 callbacks suppressed [ 2777.090817] audit: type=1400 audit(1563292998.194:95358): avc: denied { map } for pid=9944 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:18 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3c00000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2777.252485] attempt to access beyond end of device [ 2777.258117] loop5: rw=4096, want=136, limit=17 [ 2777.298660] audit: type=1400 audit(1563292998.194:95359): avc: denied { map } for pid=9950 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2777.332169] gfs2: error 10 reading superblock [ 2777.446683] audit: type=1400 audit(1563292998.194:95360): avc: denied { map } for pid=9950 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:18 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2c00, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2777.649721] audit: type=1400 audit(1563292998.214:95361): avc: denied { map } for pid=9948 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x700000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:19 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) [ 2777.913358] audit: type=1400 audit(1563292998.234:95362): avc: denied { map } for pid=9944 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2778.105054] audit: type=1400 audit(1563292998.244:95363): avc: denied { map } for pid=9950 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2778.181805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2778.194065] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2778.228608] audit: audit_lost=1398 audit_rate_limit=0 audit_backlog_limit=64 [ 2778.240175] audit: audit_lost=1399 audit_rate_limit=0 audit_backlog_limit=64 16:03:19 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) r1 = request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) 16:03:19 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3f00000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2778.736806] attempt to access beyond end of device 16:03:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 16:03:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x800000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2778.846488] loop5: rw=4096, want=136, limit=22 [ 2778.928832] gfs2: error 10 reading superblock [ 2779.088293] attempt to access beyond end of device [ 2779.152500] loop5: rw=4096, want=136, limit=22 [ 2779.161989] gfs2: error 10 reading superblock 16:03:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) 16:03:20 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x4000000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x806000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2780.024956] attempt to access beyond end of device [ 2780.064688] loop5: rw=4096, want=136, limit=31 [ 2780.087997] gfs2: error 10 reading superblock 16:03:21 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) r1 = request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) [ 2780.264744] attempt to access beyond end of device [ 2780.288567] loop5: rw=4096, want=136, limit=31 [ 2780.350640] gfs2: error 10 reading superblock 16:03:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 16:03:21 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) 16:03:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xd00000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:22 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x4305000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2781.545094] attempt to access beyond end of device [ 2781.578421] loop5: rw=4096, want=136, limit=32 16:03:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) [ 2781.613419] gfs2: error 10 reading superblock 16:03:22 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) r1 = request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, &(0x7f0000000940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) [ 2781.758969] attempt to access beyond end of device [ 2781.811493] loop5: rw=4096, want=136, limit=32 16:03:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2000000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2781.850800] gfs2: error 10 reading superblock 16:03:23 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4603, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:23 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x6000000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2782.103202] kauditd_printk_skb: 293 callbacks suppressed [ 2782.103216] audit: type=1400 audit(1563293003.214:95646): avc: denied { map } for pid=10053 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) [ 2782.347476] audit: type=1400 audit(1563293003.244:95647): avc: denied { map } for pid=10053 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) [ 2782.458189] audit: type=1400 audit(1563293003.244:95648): avc: denied { map } for pid=10053 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2782.650644] audit: type=1400 audit(1563293003.244:95649): avc: denied { map } for pid=10053 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:23 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x800e000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2782.790934] attempt to access beyond end of device 16:03:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2800000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2782.845434] loop5: rw=4096, want=136, limit=35 [ 2782.854359] audit: type=1400 audit(1563293003.264:95650): avc: denied { map } for pid=10051 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2782.896334] gfs2: error 10 reading superblock [ 2783.012911] audit: type=1400 audit(1563293003.264:95651): avc: denied { map } for pid=10051 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2783.067198] attempt to access beyond end of device [ 2783.100135] loop5: rw=4096, want=136, limit=35 [ 2783.143102] gfs2: error 10 reading superblock [ 2783.217897] audit: type=1400 audit(1563293003.324:95652): avc: denied { map } for pid=10051 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4703, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:24 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) r1 = request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) [ 2783.454653] audit: type=1400 audit(1563293003.324:95653): avc: denied { map } for pid=10051 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) 16:03:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) [ 2783.652084] audit: type=1400 audit(1563293003.364:95654): avc: denied { map } for pid=10053 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2783.667110] audit: audit_backlog=65 > audit_backlog_limit=64 16:03:24 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8035000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3c00000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2784.437548] attempt to access beyond end of device [ 2784.494716] loop5: rw=4096, want=136, limit=35 [ 2784.537342] gfs2: error 10 reading superblock 16:03:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x0) 16:03:25 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8100000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2784.714297] attempt to access beyond end of device [ 2784.736405] loop5: rw=4096, want=136, limit=35 [ 2784.770987] gfs2: error 10 reading superblock 16:03:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3f00000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8004, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\xa0\x00'}, &(0x7f0000000080)=0x1e) 16:03:26 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) r1 = request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) 16:03:26 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x86ddffff00000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) shutdown(r0, 0x0) 16:03:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x4000000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2786.161618] attempt to access beyond end of device [ 2786.199047] loop5: rw=4096, want=136, limit=64 [ 2786.254455] gfs2: error 10 reading superblock [ 2786.404669] attempt to access beyond end of device [ 2786.432121] loop5: rw=4096, want=136, limit=64 [ 2786.437078] gfs2: error 10 reading superblock 16:03:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) shutdown(r0, 0x0) 16:03:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xe101, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:27 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8847000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x4305000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xa0\x00'}, &(0x7f0000000080)=0x1e) [ 2787.124446] kauditd_printk_skb: 276 callbacks suppressed [ 2787.124462] audit: type=1400 audit(1563293008.234:95878): avc: denied { map } for pid=10139 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2787.342007] audit: type=1400 audit(1563293008.304:95879): avc: denied { map } for pid=10139 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:28 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) r1 = request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x1, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r3, r3) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r4, 0x80003) sendfile(r0, r4, &(0x7f00000000c0), 0x8000fffffffe) [ 2787.535832] audit: type=1400 audit(1563293008.324:95880): avc: denied { map } for pid=10139 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) shutdown(r0, 0x0) 16:03:28 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8848000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2787.689573] attempt to access beyond end of device [ 2787.701970] audit: type=1400 audit(1563293008.334:95881): avc: denied { map } for pid=10142 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2787.764417] loop5: rw=4096, want=136, limit=112 16:03:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x6000000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2787.817679] gfs2: error 10 reading superblock [ 2787.892343] audit: type=1400 audit(1563293008.344:95882): avc: denied { map } for pid=10142 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2788.023203] attempt to access beyond end of device [ 2788.056628] loop5: rw=4096, want=136, limit=112 [ 2788.078512] audit: type=1400 audit(1563293008.364:95883): avc: denied { map } for pid=10142 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2788.121986] gfs2: error 10 reading superblock 16:03:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xe400, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2788.276211] audit: type=1400 audit(1563293008.394:95884): avc: denied { map } for pid=10142 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2788.422259] audit: type=1400 audit(1563293008.434:95885): avc: denied { map } for pid=10143 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2788.593555] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2788.598496] audit: type=1400 audit(1563293008.434:95886): avc: denied { map } for pid=10143 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:29 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8864000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x80\x01\xa0\x00'}, &(0x7f0000000080)=0x1e) 16:03:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0x0) 16:03:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x800e000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2789.165471] attempt to access beyond end of device [ 2789.170466] loop5: rw=4096, want=136, limit=114 [ 2789.170480] gfs2: error 10 reading superblock 16:03:30 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x1, r1) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r2, r2) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r3, 0x80003) sendfile(r0, r3, &(0x7f00000000c0), 0x8000fffffffe) 16:03:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0x0) 16:03:30 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x88a8ffff00000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8035000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2790.325042] attempt to access beyond end of device [ 2790.339238] loop5: rw=4096, want=136, limit=118 [ 2790.353480] gfs2: error 10 reading superblock 16:03:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xa0\x00'}, &(0x7f0000000080)=0x1e) [ 2790.554201] attempt to access beyond end of device 16:03:31 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x88caffff00000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2790.606081] loop5: rw=4096, want=136, limit=118 [ 2790.662084] gfs2: error 10 reading superblock 16:03:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0x0) 16:03:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf900, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:31 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, r1) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r2, r2) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r3, 0x80003) sendfile(r0, r3, &(0x7f00000000c0), 0x8000fffffffe) 16:03:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8100000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:32 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8906000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) [ 2791.974211] attempt to access beyond end of device [ 2792.010305] loop5: rw=4096, want=136, limit=124 [ 2792.039117] gfs2: error 10 reading superblock [ 2792.139583] kauditd_printk_skb: 265 callbacks suppressed [ 2792.139598] audit: type=1400 audit(1563293013.234:96123): avc: denied { map } for pid=10227 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x01\x00'}, &(0x7f0000000080)=0x1e) [ 2792.194873] attempt to access beyond end of device [ 2792.199974] loop5: rw=4096, want=136, limit=124 16:03:33 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8dffffff00000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2792.292040] gfs2: error 10 reading superblock [ 2792.348828] audit: type=1400 audit(1563293013.244:96124): avc: denied { map } for pid=10227 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x86ddffff00000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2792.392052] audit: type=1400 audit(1563293013.284:96126): avc: denied { map } for pid=10225 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:33 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a", [0x40, 0xd70]}) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) [ 2792.539786] audit: type=1400 audit(1563293013.284:96125): avc: denied { map } for pid=10227 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2792.736858] audit: type=1400 audit(1563293013.294:96127): avc: denied { map } for pid=10227 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2792.912177] audit: type=1400 audit(1563293013.294:96128): avc: denied { map } for pid=10225 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) [ 2793.027070] audit: type=1400 audit(1563293013.314:96129): avc: denied { map } for pid=10233 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:34 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf5ffffff00000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2793.217032] audit: type=1400 audit(1563293013.314:96130): avc: denied { map } for pid=10233 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8847000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2793.389789] audit: type=1400 audit(1563293013.354:96131): avc: denied { map } for pid=10233 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2793.482035] gfs2: not a GFS2 filesystem [ 2793.602819] audit: type=1400 audit(1563293013.354:96132): avc: denied { map } for pid=10233 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2793.658376] gfs2: not a GFS2 filesystem 16:03:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1fffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x03\x00'}, &(0x7f0000000080)=0x1e) 16:03:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) 16:03:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8848000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:35 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 16:03:35 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xff00000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2795.093287] gfs2: not a GFS2 filesystem [ 2795.278651] gfs2: not a GFS2 filesystem 16:03:36 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xffffffffa0008000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:03:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6b6b6b, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8864000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) 16:03:37 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 16:03:37 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xffffffffa0010000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2796.337096] gfs2: not a GFS2 filesystem 16:03:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8000a0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x88a8ffff00000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x00\x80\x00'}, &(0x7f0000000080)=0x1e) 16:03:38 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xffffffffa0018000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2797.154562] kauditd_printk_skb: 248 callbacks suppressed [ 2797.154577] audit: type=1400 audit(1563293018.264:96375): avc: denied { map } for pid=10314 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) [ 2797.384959] audit: type=1400 audit(1563293018.284:96376): avc: denied { create } for pid=10316 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2797.587336] audit: type=1400 audit(1563293018.404:96377): avc: denied { map } for pid=10322 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2797.646944] gfs2: not a GFS2 filesystem 16:03:38 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 16:03:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x88caffff00000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2797.767350] audit: type=1400 audit(1563293018.474:96378): avc: denied { write } for pid=10316 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2797.852694] gfs2: not a GFS2 filesystem 16:03:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8001a0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2797.967823] audit: type=1400 audit(1563293018.474:96379): avc: denied { map } for pid=10321 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2798.104920] audit: type=1400 audit(1563293018.494:96380): avc: denied { map } for pid=10321 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:39 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xffffffffa0030000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2798.244448] audit: type=1400 audit(1563293018.534:96381): avc: denied { map } for pid=10322 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2798.403243] audit: type=1400 audit(1563293018.534:96382): avc: denied { map } for pid=10321 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x01\x80\x00'}, &(0x7f0000000080)=0x1e) [ 2798.607113] audit: type=1400 audit(1563293018.534:96383): avc: denied { map } for pid=10322 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8906000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2798.788880] audit: type=1400 audit(1563293018.534:96384): avc: denied { map } for pid=10322 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:40 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xfffffffffffff000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) [ 2799.201980] gfs2: not a GFS2 filesystem 16:03:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:40 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, &(0x7f0000000540)='TRUE', 0x4, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 16:03:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x8dffffff00000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:41 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x2, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f0000000080)=0x1e) 16:03:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) [ 2800.512399] gfs2: not a GFS2 filesystem 16:03:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf5ffffff00000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:42 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) 16:03:42 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, &(0x7f0000000540)='TRUE', 0x4, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 16:03:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:03:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xff00000000000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2801.760513] gfs2: not a GFS2 filesystem 16:03:43 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x6, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2801.917220] gfs2: not a GFS2 filesystem 16:03:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x280ffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2802.169074] kauditd_printk_skb: 259 callbacks suppressed [ 2802.169088] audit: type=1400 audit(1563293023.274:96608): avc: denied { map } for pid=10403 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) [ 2802.392034] audit: type=1400 audit(1563293023.324:96609): avc: denied { map } for pid=10400 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2802.592014] audit: type=1400 audit(1563293023.354:96610): avc: denied { map } for pid=10403 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2802.777653] audit: type=1400 audit(1563293023.354:96611): avc: denied { map } for pid=10403 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xffffffffa0008000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2802.971417] audit: type=1400 audit(1563293023.384:96612): avc: denied { map } for pid=10400 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:44 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 16:03:44 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x7, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2803.160952] audit: type=1400 audit(1563293023.384:96613): avc: denied { map } for pid=10400 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2803.189314] gfs2: not a GFS2 filesystem [ 2803.305171] audit: type=1400 audit(1563293023.394:96614): avc: denied { map } for pid=10403 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2803.387745] gfs2: not a GFS2 filesystem 16:03:44 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) [ 2803.532786] audit: type=1400 audit(1563293023.414:96615): avc: denied { map } for pid=10400 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2803.536771] audit: audit_backlog=65 > audit_backlog_limit=64 16:03:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) 16:03:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2803.629361] audit: type=1400 audit(1563293023.464:96616): avc: denied { map } for pid=10403 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xffffffffa0010000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:45 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:45 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) [ 2804.654653] gfs2: not a GFS2 filesystem 16:03:45 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) [ 2804.817690] gfs2: not a GFS2 filesystem 16:03:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xffffffffa0018000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x480ffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:46 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xd, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) 16:03:47 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) [ 2805.983817] gfs2: not a GFS2 filesystem 16:03:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xffffffffa0030000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2806.108394] gfs2: not a GFS2 filesystem 16:03:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:47 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 16:03:47 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x28, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xfffffffffffff000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:03:48 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) [ 2807.181040] kauditd_printk_skb: 241 callbacks suppressed [ 2807.181055] audit: type=1400 audit(1563293028.284:96853): avc: denied { map } for pid=10488 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2807.336953] audit: type=1400 audit(1563293028.284:96854): avc: denied { map } for pid=10489 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:48 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3c, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2807.489151] audit: type=1400 audit(1563293028.284:96855): avc: denied { map } for pid=10479 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2807.505263] gfs2: not a GFS2 filesystem [ 2807.684952] audit: type=1400 audit(1563293028.304:96856): avc: denied { map } for pid=10489 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2807.722695] gfs2: not a GFS2 filesystem 16:03:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2807.896197] audit: type=1400 audit(1563293028.324:96857): avc: denied { map } for pid=10479 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2808.081967] audit: type=1400 audit(1563293028.334:96858): avc: denied { map } for pid=10488 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x2, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:49 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) [ 2808.496655] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2808.523457] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2808.529312] audit: audit_lost=1447 audit_rate_limit=0 audit_backlog_limit=64 [ 2808.549305] audit: audit_backlog=65 > audit_backlog_limit=64 16:03:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) 16:03:50 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) 16:03:50 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x60, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2809.206315] gfs2: not a GFS2 filesystem [ 2809.335798] gfs2: not a GFS2 filesystem 16:03:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 16:03:51 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xf0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:51 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) [ 2810.400145] gfs2: not a GFS2 filesystem 16:03:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x6, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2810.529436] gfs2: not a GFS2 filesystem 16:03:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:51 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) 16:03:52 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x1a0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 16:03:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x7, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2811.568370] gfs2: not a GFS2 filesystem 16:03:52 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x300, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2811.724368] gfs2: not a GFS2 filesystem 16:03:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:53 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) [ 2812.183296] kauditd_printk_skb: 286 callbacks suppressed [ 2812.183308] audit: type=1400 audit(1563293033.294:97134): avc: denied { map } for pid=10576 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2812.359692] audit: type=1400 audit(1563293033.334:97135): avc: denied { map } for pid=10576 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) [ 2812.566694] audit: type=1400 audit(1563293033.334:97136): avc: denied { map } for pid=10578 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2812.709523] audit: type=1400 audit(1563293033.334:97137): avc: denied { map } for pid=10578 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2812.798922] gfs2: not a GFS2 filesystem [ 2812.895156] audit: type=1400 audit(1563293033.364:97138): avc: denied { map } for pid=10578 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:54 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3a0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x22000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 2813.135549] audit: type=1400 audit(1563293033.364:97139): avc: denied { map } for pid=10578 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2813.201645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2813.303637] audit: type=1400 audit(1563293033.404:97140): avc: denied { map } for pid=10579 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2813.333217] audit: audit_lost=1452 audit_rate_limit=0 audit_backlog_limit=64 [ 2813.340484] audit: backlog limit exceeded 16:03:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) 16:03:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xd, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:54 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 16:03:55 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x543, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2814.029573] gfs2: not a GFS2 filesystem [ 2814.199459] gfs2: not a GFS2 filesystem 16:03:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2c000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) 16:03:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) 16:03:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x28, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:56 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x600, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2815.363357] gfs2: not a GFS2 filesystem 16:03:56 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) [ 2815.504338] gfs2: not a GFS2 filesystem 16:03:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3c, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) 16:03:57 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x608, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) [ 2816.623637] gfs2: not a GFS2 filesystem 16:03:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x60, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2816.824603] gfs2: not a GFS2 filesystem 16:03:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) 16:03:58 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 16:03:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:03:58 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x689, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2817.230215] kauditd_printk_skb: 283 callbacks suppressed [ 2817.230238] audit: type=1400 audit(1563293038.334:97391): avc: denied { map } for pid=10665 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) [ 2817.434178] audit: type=1400 audit(1563293038.354:97392): avc: denied { map } for pid=10669 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2817.573813] audit: type=1400 audit(1563293038.354:97393): avc: denied { map } for pid=10669 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2817.690925] audit: type=1400 audit(1563293038.354:97394): avc: denied { map } for pid=10669 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xf0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:03:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) [ 2817.872098] audit: type=1400 audit(1563293038.374:97395): avc: denied { map } for pid=10669 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2817.907129] gfs2: not a GFS2 filesystem 16:03:59 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x700, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2818.075980] audit: type=1400 audit(1563293038.384:97396): avc: denied { map } for pid=10669 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x46030000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2818.274698] audit: type=1400 audit(1563293038.384:97397): avc: denied { map } for pid=10665 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2818.462339] audit: type=1400 audit(1563293038.444:97398): avc: denied { map } for pid=10665 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:03:59 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) [ 2818.704470] audit: type=1400 audit(1563293038.484:97399): avc: denied { map } for pid=10669 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x1a0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2818.886720] audit: type=1400 audit(1563293038.484:97400): avc: denied { map } for pid=10669 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) [ 2819.135720] gfs2: not a GFS2 filesystem 16:04:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) 16:04:00 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x806, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x47030000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x300, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) 16:04:01 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xd00, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:01 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) [ 2820.468013] gfs2: not a GFS2 filesystem 16:04:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:04:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6b6b6b00, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(r0, 0x0) 16:04:02 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xe80, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3a0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2821.782521] gfs2: not a GFS2 filesystem 16:04:03 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x80040000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:03 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 16:04:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) shutdown(r0, 0x0) [ 2822.270208] kauditd_printk_skb: 280 callbacks suppressed [ 2822.270223] audit: type=1400 audit(1563293043.374:97637): avc: denied { map } for pid=10753 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x80\x01\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:04:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x543, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2822.512109] audit: type=1400 audit(1563293043.364:97636): avc: denied { map } for pid=10755 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:03 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x2000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2822.702149] audit: type=1400 audit(1563293043.394:97638): avc: denied { map } for pid=10755 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2822.872732] audit: type=1400 audit(1563293043.454:97639): avc: denied { map } for pid=10753 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2823.038616] audit: type=1400 audit(1563293043.474:97640): avc: denied { map } for pid=10755 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2823.076570] gfs2: not a GFS2 filesystem [ 2823.198671] audit: type=1400 audit(1563293043.474:97641): avc: denied { map } for pid=10755 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2823.229538] gfs2: not a GFS2 filesystem 16:04:04 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2823.487938] audit: type=1400 audit(1563293043.474:97642): avc: denied { map } for pid=10755 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) shutdown(r0, 0x0) 16:04:04 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x2800, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2823.612018] audit: type=1400 audit(1563293043.484:97643): avc: denied { map } for pid=10753 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2823.647065] audit: type=1400 audit(1563293043.524:97644): avc: denied { map } for pid=10753 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2823.681332] audit: type=1400 audit(1563293043.524:97645): avc: denied { map } for pid=10753 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x600, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:04:05 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 16:04:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x608, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) shutdown(r0, 0x0) [ 2824.971977] gfs2: not a GFS2 filesystem 16:04:06 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3580, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:04:06 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa0008000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:06 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 16:04:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x689, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:07 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3c00, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) [ 2826.385352] gfs2: not a GFS2 filesystem 16:04:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) [ 2826.538516] gfs2: not a GFS2 filesystem 16:04:07 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa0010000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x700, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:08 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3f00, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2827.290148] kauditd_printk_skb: 226 callbacks suppressed [ 2827.290162] audit: type=1400 audit(1563293048.394:97872): avc: denied { map } for pid=10843 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:08 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2827.457678] audit: type=1400 audit(1563293048.414:97873): avc: denied { map } for pid=10843 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2827.576168] audit: type=1400 audit(1563293048.434:97874): avc: denied { map } for pid=10841 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2827.695970] audit: type=1400 audit(1563293048.434:97875): avc: denied { map } for pid=10843 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2827.801530] gfs2: not a GFS2 filesystem [ 2827.844082] audit: type=1400 audit(1563293048.444:97876): avc: denied { map } for pid=10841 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) [ 2827.957704] gfs2: not a GFS2 filesystem 16:04:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x806, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2828.029669] audit: type=1400 audit(1563293048.444:97877): avc: denied { map } for pid=10843 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:09 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa0018000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:09 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2828.206975] audit: type=1400 audit(1563293048.534:97878): avc: denied { map } for pid=10843 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) [ 2828.532277] audit: type=1400 audit(1563293048.564:97879): avc: denied { map } for pid=10843 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2828.797657] audit: type=1400 audit(1563293048.564:97880): avc: denied { map } for pid=10843 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2828.861690] audit: audit_backlog=65 > audit_backlog_limit=64 16:04:10 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4305, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xd00, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:10 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2829.458473] gfs2: not a GFS2 filesystem [ 2829.570252] gfs2: not a GFS2 filesystem 16:04:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 16:04:10 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa0030000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:11 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4788, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xe80, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) [ 2830.689693] gfs2: not a GFS2 filesystem 16:04:11 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4888, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2830.837496] gfs2: not a GFS2 filesystem 16:04:12 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:12 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x2000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/pid\x00') 16:04:12 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x6000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) [ 2831.873794] gfs2: not a GFS2 filesystem [ 2832.067928] gfs2: not a GFS2 filesystem 16:04:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x2800, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:13 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xe1010000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2832.303706] kauditd_printk_skb: 264 callbacks suppressed [ 2832.303718] audit: type=1400 audit(1563293053.414:98110): avc: denied { map } for pid=10936 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:13 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2832.518310] audit: type=1400 audit(1563293053.454:98111): avc: denied { map } for pid=10936 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x6488, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2832.746197] audit: type=1400 audit(1563293053.454:98112): avc: denied { map } for pid=10936 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2832.910540] audit: type=1400 audit(1563293053.504:98113): avc: denied { map } for pid=10939 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2833.116709] audit: type=1400 audit(1563293053.514:98114): avc: denied { map } for pid=10939 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2833.256239] gfs2: not a GFS2 filesystem [ 2833.302671] audit: type=1400 audit(1563293053.534:98115): avc: denied { map } for pid=10939 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3580, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2833.434393] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2833.445990] gfs2: not a GFS2 filesystem [ 2833.469336] audit: audit_lost=1491 audit_rate_limit=0 audit_backlog_limit=64 [ 2833.527103] audit: backlog limit exceeded [ 2833.532525] audit: type=1400 audit(1563293053.544:98116): avc: denied { map } for pid=10939 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xe4000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 16:04:15 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x800e, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:15 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:15 executing program 1: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x800) r1 = dup(r0) getsockname$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0x3, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @rand_addr, 0x7fffffffffffffff}, 0x1c) sendto$inet6(r0, 0x0, 0xfd05, 0x2000000a, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0x1c) r2 = getpgrp(0x0) timer_create(0x2, &(0x7f0000000040)={0x0, 0x7, 0x4, @tid=r2}, &(0x7f00000000c0)=0x0) timer_delete(r3) [ 2834.517365] gfs2: not a GFS2 filesystem 16:04:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3c00, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:16 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8035, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x01\x00'}, &(0x7f0000000080)=0x1e) 16:04:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3f00, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2836.164232] gfs2: not a GFS2 filesystem 16:04:17 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2836.303671] gfs2: not a GFS2 filesystem 16:04:17 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8100, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:17 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf9000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:17 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xff4, "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"}, 0x1000) 16:04:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2837.313740] kauditd_printk_skb: 313 callbacks suppressed [ 2837.313754] audit: type=1400 audit(1563293058.424:98394): avc: denied { map } for pid=11126 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) 16:04:18 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8847, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2837.526331] audit: type=1400 audit(1563293058.424:98395): avc: denied { map } for pid=11122 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:18 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2837.662437] gfs2: not a GFS2 filesystem [ 2837.699435] audit: type=1400 audit(1563293058.424:98396): avc: denied { map } for pid=11126 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2837.862548] gfs2: not a GFS2 filesystem [ 2837.905621] audit: type=1400 audit(1563293058.444:98397): avc: denied { map } for pid=11122 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:19 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffff1f00, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:19 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xff4, "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"}, 0x1000) 16:04:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4305, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2838.102033] audit: type=1400 audit(1563293058.454:98398): avc: denied { map } for pid=11126 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2838.235775] audit: type=1400 audit(1563293058.454:98399): avc: denied { map } for pid=11129 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2838.418797] audit: type=1400 audit(1563293058.474:98401): avc: denied { map } for pid=11119 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:19 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8848, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2838.612244] audit: type=1400 audit(1563293058.484:98402): avc: denied { map } for pid=11126 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2838.737848] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2838.738083] audit: type=1400 audit(1563293058.484:98403): avc: denied { map } for pid=11131 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2839.072567] gfs2: not a GFS2 filesystem 16:04:20 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xff4, "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"}, 0x1000) 16:04:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffff8002, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4788, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:20 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00F\x03\x00'}, &(0x7f0000000080)=0x1e) 16:04:21 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8864, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:21 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f000033bffc)) [ 2840.009806] gfs2: not a GFS2 filesystem 16:04:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4888, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2840.171574] gfs2: not a GFS2 filesystem 16:04:21 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffff8004, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:21 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 16:04:22 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:22 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8906, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00G\x03\x00'}, &(0x7f0000000080)=0x1e) 16:04:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x6000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2841.392107] gfs2: not a GFS2 filesystem 16:04:22 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:23 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 16:04:23 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xf000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2842.349452] kauditd_printk_skb: 285 callbacks suppressed [ 2842.349468] audit: type=1400 audit(1563293063.454:98644): avc: denied { map } for pid=11217 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x6488, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2842.510658] audit: type=1400 audit(1563293063.454:98645): avc: denied { map } for pid=11209 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2842.686616] audit: type=1400 audit(1563293063.474:98646): avc: denied { map } for pid=11209 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2842.806175] gfs2: not a GFS2 filesystem 16:04:24 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2843.003130] audit: type=1400 audit(1563293063.494:98647): avc: denied { map } for pid=11212 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2843.040566] audit: type=1400 audit(1563293063.494:98648): avc: denied { map } for pid=11219 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2843.069501] audit: type=1400 audit(1563293063.494:98649): avc: denied { map } for pid=11212 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2843.119393] audit: type=1400 audit(1563293063.504:98650): avc: denied { map } for pid=11217 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2843.145420] audit: type=1400 audit(1563293063.504:98651): avc: denied { map } for pid=11219 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x03\x00'}, &(0x7f0000000080)=0x1e) 16:04:24 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 16:04:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2843.302181] audit: type=1400 audit(1563293063.524:98652): avc: denied { map } for pid=11214 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2843.462481] audit: type=1400 audit(1563293063.524:98653): avc: denied { map } for pid=11219 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:24 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xff00, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x800e, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2844.177573] gfs2: not a GFS2 filesystem 16:04:25 executing program 1: getsockopt(0xffffffffffffffff, 0x114, 0x0, 0x0, &(0x7f000033bffc)) [ 2844.326967] gfs2: not a GFS2 filesystem 16:04:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1a0ffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:25 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:25 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8000a0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8035, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:04:26 executing program 1: getsockopt(0xffffffffffffffff, 0x114, 0x0, 0x0, &(0x7f000033bffc)) [ 2845.329605] gfs2: not a GFS2 filesystem 16:04:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3a0ffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:26 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8001a0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8100, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:27 executing program 1: getsockopt(0xffffffffffffffff, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 16:04:27 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2846.571126] gfs2: not a GFS2 filesystem 16:04:27 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xf0ffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) [ 2846.725870] gfs2: not a GFS2 filesystem 16:04:27 executing program 1: r0 = socket(0x0, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 16:04:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8847, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2847.363322] kauditd_printk_skb: 256 callbacks suppressed [ 2847.363338] audit: type=1400 audit(1563293068.474:98910): avc: denied { map } for pid=11293 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2847.602782] audit: type=1400 audit(1563293068.474:98911): avc: denied { map } for pid=11293 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2847.722155] audit: type=1400 audit(1563293068.574:98912): avc: denied { map } for pid=11300 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:29 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x1000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:29 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(r0, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2847.931195] audit: type=1400 audit(1563293068.584:98913): avc: denied { map } for pid=11300 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2848.109870] audit: type=1400 audit(1563293068.604:98914): avc: denied { map } for pid=11300 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2848.212325] gfs2: not a GFS2 filesystem [ 2848.296990] audit: type=1400 audit(1563293068.624:98915): avc: denied { map } for pid=11300 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:29 executing program 1: r0 = socket(0x0, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 16:04:29 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8848, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2848.502598] audit: type=1400 audit(1563293068.674:98916): avc: denied { map } for pid=11298 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 2848.687115] audit: type=1400 audit(1563293068.704:98917): avc: denied { map } for pid=11298 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:29 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x2000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2848.797308] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2848.804610] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2849.524155] gfs2: not a GFS2 filesystem 16:04:30 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8864, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6b6b6b00000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:31 executing program 1: r0 = socket(0x0, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 16:04:31 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 16:04:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8906, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2850.681233] gfs2: not a GFS2 filesystem [ 2850.840805] gfs2: not a GFS2 filesystem 16:04:32 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8000a0ffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:32 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x6000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:32 executing program 1: r0 = socket(0x40000000015, 0x0, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 16:04:32 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, r0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xf000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2851.953043] gfs2: not a GFS2 filesystem 16:04:33 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x7000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 2852.126609] gfs2: not a GFS2 filesystem 16:04:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8001a0ffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:33 executing program 1: r0 = socket(0x40000000015, 0x0, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f000033bffc)) [ 2852.377657] kauditd_printk_skb: 282 callbacks suppressed [ 2852.377672] audit: type=1400 audit(1563293073.484:99196): avc: denied { map } for pid=11384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2852.567864] audit: type=1400 audit(1563293073.484:99197): avc: denied { map } for pid=11384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xff00, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2852.712774] audit: type=1400 audit(1563293073.564:99198): avc: denied { create } for pid=11388 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2852.895818] audit: type=1400 audit(1563293073.564:99199): avc: denied { write } for pid=11388 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:04:34 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:34 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2853.048973] audit: type=1400 audit(1563293073.574:99200): avc: denied { map } for pid=11392 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2853.198353] audit: type=1400 audit(1563293073.574:99201): avc: denied { map } for pid=11392 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) [ 2853.315790] audit: type=1400 audit(1563293073.574:99202): avc: denied { map } for pid=11392 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:34 executing program 1: r0 = socket(0x40000000015, 0x0, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f000033bffc)) [ 2853.445898] gfs2: not a GFS2 filesystem [ 2853.506244] audit: type=1400 audit(1563293073.574:99203): avc: denied { map } for pid=11392 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2853.636889] audit: type=1400 audit(1563293073.654:99204): avc: denied { map } for pid=11392 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8000a0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2853.777277] gfs2: not a GFS2 filesystem 16:04:35 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8060000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2853.909768] audit: type=1400 audit(1563293073.654:99205): avc: denied { map } for pid=11394 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:35 executing program 1: socket(0x40000000015, 0x805, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 16:04:36 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:36 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xd000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2854.985515] gfs2: not a GFS2 filesystem 16:04:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8001a0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) [ 2855.152032] gfs2: not a GFS2 filesystem 16:04:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:36 executing program 1: socket(0x40000000015, 0x805, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 16:04:37 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x20000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xf0ffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2856.246396] gfs2: not a GFS2 filesystem 16:04:37 executing program 1: socket(0x40000000015, 0x805, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x0, 0x0, &(0x7f000033bffc)) 16:04:37 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000680)) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x280ffff00000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:04:38 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x0, 0x0, 0x0, &(0x7f000033bffc)) 16:04:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x1000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2857.195476] gfs2: not a GFS2 filesystem 16:04:38 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x28000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2857.382525] kauditd_printk_skb: 241 callbacks suppressed [ 2857.382540] audit: type=1400 audit(1563293078.494:99447): avc: denied { map } for pid=11474 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2857.569455] audit: type=1400 audit(1563293078.524:99448): avc: denied { map } for pid=11474 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2857.781383] audit: type=1400 audit(1563293078.544:99449): avc: denied { map } for pid=11480 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:39 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2857.958579] audit: type=1400 audit(1563293078.544:99450): avc: denied { map } for pid=11480 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2858.104212] audit: type=1400 audit(1563293078.584:99451): avc: denied { map } for pid=11474 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:39 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x0, 0x0, 0x0, &(0x7f000033bffc)) 16:04:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x2000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:39 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3c000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2858.284367] audit: type=1400 audit(1563293078.584:99452): avc: denied { map } for pid=11474 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2858.436259] audit: type=1400 audit(1563293078.594:99453): avc: denied { map } for pid=11480 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x00\x80\x00'}, &(0x7f0000000080)=0x1e) [ 2858.605326] audit: type=1400 audit(1563293078.624:99454): avc: denied { map } for pid=11480 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2858.651616] gfs2: not a GFS2 filesystem [ 2858.793615] audit: type=1400 audit(1563293078.624:99455): avc: denied { map } for pid=11480 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2858.824839] gfs2: not a GFS2 filesystem [ 2858.866548] audit: audit_backlog=65 > audit_backlog_limit=64 16:04:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x480ffff00000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:40 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3f000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:40 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x0, 0x0, 0x0, &(0x7f000033bffc)) 16:04:40 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x4000007) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2860.116292] gfs2: not a GFS2 filesystem 16:04:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x6000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x01\x80\x00'}, &(0x7f0000000080)=0x1e) 16:04:41 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x40000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2860.321949] gfs2: not a GFS2 filesystem 16:04:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:41 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, 0x0) 16:04:42 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x43050000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:42 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, 0x0) 16:04:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x7000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:42 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2861.512434] gfs2: not a GFS2 filesystem [ 2861.705968] gfs2: not a GFS2 filesystem 16:04:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f0000000080)=0x1e) 16:04:43 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, 0x0) 16:04:43 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x60000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2862.411592] kauditd_printk_skb: 281 callbacks suppressed [ 2862.411608] audit: type=1400 audit(1563293083.514:99714): avc: denied { map } for pid=11562 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2862.554152] audit: type=1400 audit(1563293083.584:99715): avc: denied { map } for pid=11557 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2862.641139] gfs2: not a GFS2 filesystem [ 2862.694518] audit: type=1400 audit(1563293083.584:99716): avc: denied { map } for pid=11557 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2862.721115] audit: type=1400 audit(1563293083.594:99717): avc: denied { map } for pid=11562 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2862.751219] audit: type=1400 audit(1563293083.614:99718): avc: denied { map } for pid=11562 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2862.898828] gfs2: not a GFS2 filesystem [ 2862.931663] audit: type=1400 audit(1563293083.644:99719): avc: denied { create } for pid=11558 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:04:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2863.106481] audit: type=1400 audit(1563293083.664:99720): avc: denied { map } for pid=11562 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:44 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2863.327712] audit: type=1400 audit(1563293083.664:99721): avc: denied { map } for pid=11562 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet6(0xa, 0x7, 0x800000007fc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffd4) socket$inet6(0xa, 0x2, 0x4b2e) ioctl(r5, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r8 = socket(0xa, 0x3, 0x8) r9 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$TIOCGSID(r9, 0x5429, &(0x7f0000000200)=0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, &(0x7f0000000440)=r10) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) ioctl$RTC_WKALM_RD(r9, 0x80287010, &(0x7f00000002c0)) setsockopt$IP_VS_SO_SET_DELDEST(r8, 0x0, 0x488, &(0x7f0000000080)={{0x3b, @remote, 0x4e24, 0x0, 'lblcr\x00', 0x1e, 0x0, 0x13}, {@remote, 0x4e21, 0x7, 0xffff, 0x0, 0x2}}, 0x44) r11 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r7, &(0x7f0000000c40)=ANY=[], 0x0) close(r6) r12 = dup3(r2, r11, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r12, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f00000001c0)={0x0, 0x6ceb8731050447be, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x2) sendmsg$key(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYRES16=r5], 0x2}}, 0x0) sendmsg$key(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000640)=ANY=[@ANYPTR64=&(0x7f0000000b40)=ANY=[@ANYPTR=&(0x7f0000000a80)=ANY=[@ANYBLOB="033c9f0c3c000000000000ffff8e27652845fec85845609dd83481e64ae482a32d61a27e71ab00"/54, @ANYRESHEX=r4, @ANYRESOCT=r3, @ANYRES32, @ANYRES64=r1, @ANYRESDEC=r2], @ANYRESOCT=0x0]], 0x8}}, 0x0) [ 2863.556417] audit: type=1400 audit(1563293083.724:99722): avc: denied { write } for pid=11558 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:04:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:04:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8060000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2863.752052] audit: type=1400 audit(1563293083.764:99723): avc: denied { map } for pid=11562 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:44 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x800e0000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2864.260594] gfs2: not a GFS2 filesystem [ 2864.417516] gfs2: not a GFS2 filesystem 16:04:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xd000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:45 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x80350000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2864.896065] bridge0: port 3(gretap0) entered blocking state [ 2864.953215] bridge0: port 3(gretap0) entered disabled state [ 2865.040381] device gretap0 entered promiscuous mode [ 2865.105153] bridge0: port 3(gretap0) entered blocking state [ 2865.111150] bridge0: port 3(gretap0) entered forwarding state 16:04:46 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) [ 2865.527599] gfs2: not a GFS2 filesystem 16:04:46 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x81000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2865.699189] gfs2: not a GFS2 filesystem 16:04:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x20000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:47 executing program 1: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f0000000140)=[{0x0, 0xffffffffffffff89}], 0x1) semop(r0, &(0x7f0000000080)=[{0x4}, {0x0, 0xffffffff}], 0x2) semop(r0, &(0x7f00000000c0)=[{0x0, 0x6}], 0x1) 16:04:47 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x86ddffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x28000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2866.828416] gfs2: not a GFS2 filesystem 16:04:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) 16:04:48 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2867.412136] kauditd_printk_skb: 279 callbacks suppressed [ 2867.412152] audit: type=1400 audit(1563293088.524:99964): avc: denied { map } for pid=11747 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2867.626196] audit: type=1400 audit(1563293088.564:99965): avc: denied { map } for pid=11747 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2867.809449] audit: type=1400 audit(1563293088.594:99966): avc: denied { map } for pid=11747 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:48 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88470000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3c000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x0, 0x0) r1 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x200031, 0xffffffffffffffff, 0x0) [ 2867.999485] audit: type=1400 audit(1563293088.624:99967): avc: denied { map } for pid=11747 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2868.046950] gfs2: not a GFS2 filesystem [ 2868.197963] gfs2: not a GFS2 filesystem [ 2868.210020] audit: type=1400 audit(1563293088.704:99968): avc: denied { map } for pid=11747 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:49 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2c00000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2868.399991] audit: type=1400 audit(1563293088.704:99969): avc: denied { map } for pid=11747 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2868.521574] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2868.557789] audit: audit_backlog=65 > audit_backlog_limit=64 16:04:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) [ 2868.566322] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2868.578981] audit: audit_lost=1542 audit_rate_limit=0 audit_backlog_limit=64 16:04:49 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:50 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88480000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3f000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 2869.222079] gfs2: not a GFS2 filesystem [ 2869.377683] gfs2: not a GFS2 filesystem 16:04:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x40000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:51 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88640000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) 16:04:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 16:04:51 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2870.712113] gfs2: not a GFS2 filesystem [ 2870.814532] gfs2: not a GFS2 filesystem 16:04:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:52 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88a8ffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x43050000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 16:04:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 2871.933905] gfs2: not a GFS2 filesystem 16:04:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x60000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:53 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88caffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4603000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:53 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 2872.423645] kauditd_printk_skb: 284 callbacks suppressed [ 2872.423662] audit: type=1400 audit(1563293093.534:100250): avc: denied { map } for pid=11942 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2872.622667] audit: type=1400 audit(1563293093.574:100251): avc: denied { map } for pid=11944 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2872.808840] audit: type=1400 audit(1563293093.584:100252): avc: denied { map } for pid=11942 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2872.944485] audit: type=1400 audit(1563293093.584:100253): avc: denied { map } for pid=11942 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:54 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x89060000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2873.109935] audit: type=1400 audit(1563293093.484:100248): avc: denied { map } for pid=11938 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x800e0000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 2873.289939] gfs2: not a GFS2 filesystem [ 2873.327220] audit: type=1400 audit(1563293093.604:100254): avc: denied { map } for pid=11938 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2873.482412] gfs2: not a GFS2 filesystem 16:04:54 executing program 1: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 2873.556618] audit: type=1400 audit(1563293093.634:100255): avc: denied { map } for pid=11944 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4703000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2873.792439] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2873.802374] audit: type=1400 audit(1563293093.634:100256): avc: denied { map } for pid=11944 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2873.813611] audit: audit_backlog=65 > audit_backlog_limit=64 16:04:55 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:55 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8dffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x80350000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:55 executing program 1: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 2874.674142] gfs2: not a GFS2 filesystem [ 2874.810986] gfs2: not a GFS2 filesystem 16:04:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8004000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 16:04:56 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xa0008000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x81000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:56 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:56 executing program 1: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 2875.768097] gfs2: not a GFS2 filesystem 16:04:57 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xa0010000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x86ddffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 16:04:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) 16:04:58 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xa0018000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:04:58 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2877.102124] gfs2: not a GFS2 filesystem 16:04:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88470000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2877.243568] gfs2: not a GFS2 filesystem 16:04:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xe101000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:58 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 2877.477147] kauditd_printk_skb: 277 callbacks suppressed [ 2877.477161] audit: type=1400 audit(1563293098.584:100512): avc: denied { map } for pid=12034 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2877.637696] audit: type=1400 audit(1563293098.584:100513): avc: denied { map } for pid=12034 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2877.776012] audit: type=1400 audit(1563293098.584:100514): avc: denied { map } for pid=12034 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:59 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xa0030000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2878.017629] audit: type=1400 audit(1563293098.634:100515): avc: denied { map } for pid=12034 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88480000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2878.216062] audit: type=1400 audit(1563293098.674:100516): avc: denied { map } for pid=12034 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:04:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) [ 2878.369732] audit: type=1400 audit(1563293098.714:100517): avc: denied { map } for pid=12034 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2878.446656] gfs2: not a GFS2 filesystem [ 2878.457280] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2878.457716] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2878.477894] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2878.503579] audit: audit_lost=1553 audit_rate_limit=0 audit_backlog_limit=64 [ 2878.650432] gfs2: not a GFS2 filesystem 16:04:59 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:04:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xe400000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:04:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 16:04:59 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xf5ffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88640000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 16:05:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\xa0\x00'}, &(0x7f0000000080)=0x1e) 16:05:00 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xff000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2879.881606] gfs2: not a GFS2 filesystem [ 2880.063149] gfs2: not a GFS2 filesystem 16:05:01 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:05:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88a8ffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:01 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffa888, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 16:05:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xa0\x00'}, &(0x7f0000000080)=0x1e) [ 2881.298204] gfs2: not a GFS2 filesystem [ 2881.461182] gfs2: not a GFS2 filesystem 16:05:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88caffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf900000000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:02 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffca88, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:03 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:05:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 16:05:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x01\xa0\x00'}, &(0x7f0000000080)=0x1e) [ 2882.524513] kauditd_printk_skb: 282 callbacks suppressed [ 2882.524527] audit: type=1400 audit(1563293103.634:100789): avc: denied { map } for pid=12119 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x89060000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}], 0x1, 0x0) 16:05:03 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffdd86, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2882.753132] audit: type=1400 audit(1563293103.674:100790): avc: denied { map } for pid=12119 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2882.795869] gfs2: not a GFS2 filesystem [ 2882.914563] audit: type=1400 audit(1563293103.744:100792): avc: denied { map } for pid=12119 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:04 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffff1f0000000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2883.112322] audit: type=1400 audit(1563293103.744:100791): avc: denied { map } for pid=12124 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2883.263051] audit: type=1400 audit(1563293103.754:100793): avc: denied { map } for pid=12124 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2883.421740] audit: type=1400 audit(1563293103.774:100794): avc: denied { map } for pid=12119 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:04 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2883.593326] audit: type=1400 audit(1563293103.784:100795): avc: denied { map } for pid=12124 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8dffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}], 0x1, 0x0) [ 2883.752245] audit: type=1400 audit(1563293103.794:100796): avc: denied { map } for pid=12124 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:04 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xfffff000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2883.898303] gfs2: not a GFS2 filesystem 16:05:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xa0\x00'}, &(0x7f0000000080)=0x1e) [ 2883.931981] audit: type=1400 audit(1563293103.804:100797): avc: denied { map } for pid=12130 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2884.039732] gfs2: not a GFS2 filesystem [ 2884.043957] audit: type=1400 audit(1563293103.804:100798): avc: denied { map } for pid=12130 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:05 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xa0008000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:05 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffff8d, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:05 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:05:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}], 0x1, 0x0) [ 2885.179760] gfs2: not a GFS2 filesystem [ 2885.359568] gfs2: not a GFS2 filesystem 16:05:06 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffa0008000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x01\x00'}, &(0x7f0000000080)=0x1e) 16:05:06 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xfffffff5, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xa0010000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2886.441151] gfs2: not a GFS2 filesystem 16:05:07 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000000c0), 0x8000fffffffe) [ 2886.594278] gfs2: not a GFS2 filesystem 16:05:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xa0018000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:07 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffa0010000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:07 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x1a0ffffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:05:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x03\x00'}, &(0x7f0000000080)=0x1e) 16:05:08 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3a0ffffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2887.548423] kauditd_printk_skb: 267 callbacks suppressed [ 2887.548440] audit: type=1400 audit(1563293108.654:101063): avc: denied { create } for pid=12220 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2887.736813] audit: type=1400 audit(1563293108.714:101064): avc: denied { write } for pid=12220 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:05:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xa0030000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2887.845135] gfs2: not a GFS2 filesystem [ 2887.919485] audit: type=1400 audit(1563293108.744:101065): avc: denied { map } for pid=12219 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2888.067781] gfs2: not a GFS2 filesystem 16:05:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2888.155425] audit: type=1400 audit(1563293108.754:101066): avc: denied { map } for pid=12226 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:09 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffa0018000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:09 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:05:09 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8000a0ffffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2888.349696] audit: type=1400 audit(1563293108.764:101067): avc: denied { map } for pid=12219 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2888.512274] audit: type=1400 audit(1563293108.814:101068): avc: denied { map } for pid=12226 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2888.745430] audit: type=1400 audit(1563293108.824:101069): avc: denied { map } for pid=12226 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) [ 2888.908352] audit: type=1400 audit(1563293108.844:101070): avc: denied { map } for pid=12226 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xf5ffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2888.950847] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2888.972764] audit: audit_backlog=65 > audit_backlog_limit=64 16:05:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 2889.202027] gfs2: not a GFS2 filesystem 16:05:10 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8001a0ffffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:10 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffa0030000, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:10 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000000c0), 0x8000fffffffe) 16:05:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xff000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 16:05:11 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xf0ffffffffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x00\x80\x00'}, &(0x7f0000000080)=0x1e) [ 2890.440800] gfs2: not a GFS2 filesystem 16:05:11 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 16:05:12 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x100000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffa888, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:12 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0), 0x8000fffffffe) [ 2891.604389] gfs2: not a GFS2 filesystem [ 2891.772053] gfs2: not a GFS2 filesystem 16:05:13 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffca88, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x01\x80\x00'}, &(0x7f0000000080)=0x1e) 16:05:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 16:05:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x200000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2892.553654] kauditd_printk_skb: 302 callbacks suppressed [ 2892.553671] audit: type=1400 audit(1563293113.664:101330): avc: denied { map } for pid=12315 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2892.762064] audit: type=1400 audit(1563293113.674:101331): avc: denied { map } for pid=12313 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 16:05:14 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0), 0x8000fffffffe) [ 2892.962331] audit: type=1400 audit(1563293113.684:101332): avc: denied { map } for pid=12313 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffdd86, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2893.163641] audit: type=1400 audit(1563293113.734:101334): avc: denied { map } for pid=12316 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:14 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x300000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2893.340262] audit: type=1400 audit(1563293113.734:101335): avc: denied { map } for pid=12316 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2893.564696] audit: type=1400 audit(1563293113.734:101336): avc: denied { map } for pid=12316 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f0000000080)=0x1e) [ 2893.768699] audit: type=1400 audit(1563293113.694:101333): avc: denied { map } for pid=12315 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 2893.893051] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2893.893985] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2893.908726] audit: audit_backlog=65 > audit_backlog_limit=64 16:05:15 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x600000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xfffff000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:15 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0), 0x8000fffffffe) 16:05:16 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) open_by_handle_at(r0, &(0x7f00000000c0)={0x8}, 0x0) 16:05:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffff8d, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:16 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x700000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:05:16 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) open_by_handle_at(r0, &(0x7f00000000c0)={0x8}, 0x0) 16:05:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xfffffff5, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:17 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x800000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:17 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:17 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 16:05:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) open_by_handle_at(r0, &(0x7f00000000c0)={0x8}, 0x0) 16:05:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) 16:05:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x1a0ffffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:18 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x806000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2897.569553] kauditd_printk_skb: 292 callbacks suppressed [ 2897.569567] audit: type=1400 audit(1563293118.674:101599): avc: denied { map } for pid=12396 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:18 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x22, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2897.788328] audit: type=1400 audit(1563293118.714:101600): avc: denied { map } for pid=12402 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2897.917825] audit: type=1400 audit(1563293118.724:101601): avc: denied { map } for pid=12402 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) open_by_handle_at(r0, &(0x7f00000000c0)={0x8}, 0x0) [ 2898.090381] audit: type=1400 audit(1563293118.754:101602): avc: denied { map } for pid=12402 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3a0ffffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2898.264393] audit: type=1400 audit(1563293118.754:101603): avc: denied { map } for pid=12402 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:19 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 2898.447403] audit: type=1400 audit(1563293118.824:101604): avc: denied { map } for pid=12402 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:19 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xd00000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2898.631999] audit: type=1400 audit(1563293118.854:101605): avc: denied { create } for pid=12400 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:05:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) 16:05:19 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2898.843948] audit: type=1400 audit(1563293118.874:101606): avc: denied { map } for pid=12402 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2899.004299] audit: type=1400 audit(1563293118.884:101607): avc: denied { write } for pid=12400 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2899.042548] audit: audit_backlog=65 > audit_backlog_limit=64 16:05:20 executing program 1: open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)={0x8}, 0x0) 16:05:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8000a0ffffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:20 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x2000000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe4, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:21 executing program 1: open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)={0x8}, 0x0) 16:05:21 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 16:05:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:05:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8001a0ffffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:21 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf9, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:21 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x2800000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:22 executing program 1: open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)={0x8}, 0x0) 16:05:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xf0ffffffffffff, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:22 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:22 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3c00000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:22 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x0) 16:05:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) 16:05:23 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)={0x8}, 0x0) 16:05:23 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1e1, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x100000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2902.589584] kauditd_printk_skb: 314 callbacks suppressed [ 2902.589600] audit: type=1400 audit(1563293123.694:101860): avc: denied { map } for pid=12488 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:23 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3f00000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:23 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)={0x8}, 0x0) [ 2902.772576] audit: type=1400 audit(1563293123.704:101861): avc: denied { map } for pid=12494 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2902.959536] audit: type=1400 audit(1563293123.714:101862): avc: denied { map } for pid=12494 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2903.141575] audit: type=1400 audit(1563293123.714:101863): avc: denied { map } for pid=12490 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2903.277992] audit: type=1400 audit(1563293123.724:101864): avc: denied { map } for pid=12494 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x346, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x200000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:24 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), 0x0) request_key(0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) personality(0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x0) 16:05:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 2903.448723] audit: type=1400 audit(1563293123.734:101865): avc: denied { map } for pid=12494 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2903.615434] audit: type=1400 audit(1563293123.744:101866): avc: denied { map } for pid=12490 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2903.752344] audit: type=1400 audit(1563293123.754:101867): avc: denied { map } for pid=12488 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:24 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4000000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:24 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)={0x8}, 0x0) [ 2903.940939] audit: type=1400 audit(1563293123.764:101868): avc: denied { map } for pid=12487 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x347, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2904.102485] audit: audit_backlog=65 > audit_backlog_limit=64 16:05:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x300000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000007f80)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{&(0x7f0000000480)={0x2, 0x0, @initdev}, 0x10, 0x0}}], 0x2, 0x0) 16:05:25 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) open_by_handle_at(r0, 0x0, 0x0) 16:05:25 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4305000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3a0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 16:05:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x600000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:26 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) open_by_handle_at(r0, 0x0, 0x0) 16:05:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x480, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:26 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x6000000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:26 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4000000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x700000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:27 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) open_by_handle_at(r0, 0x0, 0x0) 16:05:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 16:05:27 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x800e000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:27 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4000000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @initdev}, {0x0, @local}, 0x4, {0x2, 0x0, @broadcast}, 'veth0_to_bond\x00'}) 16:05:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x800000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:28 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4000000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2907.600707] kauditd_printk_skb: 281 callbacks suppressed [ 2907.600723] audit: type=1400 audit(1563293128.704:102145): avc: denied { map } for pid=12584 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:28 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8035000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2907.775372] audit: type=1400 audit(1563293128.714:102146): avc: denied { map } for pid=12585 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) [ 2908.079369] audit: type=1400 audit(1563293128.714:102147): avc: denied { map } for pid=12585 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2908.190879] audit: type=1400 audit(1563293128.744:102148): avc: denied { map } for pid=12584 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2908.378002] audit: type=1400 audit(1563293128.764:102149): avc: denied { map } for pid=12585 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:29 executing program 4: 16:05:29 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x806000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:29 executing program 1: 16:05:29 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8100000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2908.530837] audit: type=1400 audit(1563293128.764:102150): avc: denied { map } for pid=12585 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2908.701955] audit: type=1400 audit(1563293128.774:102151): avc: denied { map } for pid=12584 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2908.881793] audit: type=1400 audit(1563293128.834:102152): avc: denied { map } for pid=12584 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2909.066078] audit: type=1400 audit(1563293128.854:102153): avc: denied { map } for pid=12585 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2909.147063] audit: audit_backlog=65 > audit_backlog_limit=64 16:05:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xd00000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:30 executing program 4: 16:05:30 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x86ddffff00000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:30 executing program 1: 16:05:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) 16:05:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:31 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8847000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x2000000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:31 executing program 1: 16:05:31 executing program 4: 16:05:32 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c00, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:05:32 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8848000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x2800000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000109000/0x2000)=nil, 0x2000, 0x0) 16:05:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz'}, 0x0, 0xfffffffffffffffc) 16:05:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:33 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8864000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3c00000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) 16:05:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:05:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2912.639457] kauditd_printk_skb: 256 callbacks suppressed [ 2912.639473] audit: type=1400 audit(1563293133.744:102399): avc: denied { map } for pid=12668 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2912.787698] audit: type=1400 audit(1563293133.764:102400): avc: denied { map } for pid=12669 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:34 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88a8ffff00000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2912.972803] audit: type=1400 audit(1563293133.764:102401): avc: denied { map } for pid=12669 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2913.092343] audit: type=1400 audit(1563293133.764:102402): avc: denied { map } for pid=12669 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x3f00000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2913.178503] audit: type=1400 audit(1563293133.764:102403): avc: denied { map } for pid=12669 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) [ 2913.374335] audit: type=1400 audit(1563293133.794:102404): avc: denied { map } for pid=12671 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2913.582076] audit: type=1400 audit(1563293133.804:102405): avc: denied { map } for pid=12668 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4603, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2913.824713] audit: type=1400 audit(1563293133.804:102406): avc: denied { map } for pid=12669 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:35 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88caffff00000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2914.001108] audit: type=1400 audit(1563293133.834:102407): avc: denied { map } for pid=12671 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) [ 2914.073752] audit: audit_backlog=65 > audit_backlog_limit=64 16:05:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:05:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4000000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4703, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:36 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8906000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x01\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:05:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x4305000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8004, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="24000000200007041dfffd946f610500020000001f0000000000080008000c000400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008740)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000004600)=@ax25={{}, [@netrom, @remote, @null, @remote, @remote, @rose, @null, @rose]}, 0x80, 0x0, 0x0, &(0x7f0000004800)=""/4096, 0x1000}, 0x80000001}, {{&(0x7f0000005800)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}}], 0x3, 0x2, 0x0) 16:05:37 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8dffffff00000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x6000000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe101, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:05:38 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xf5ffffff00000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x800e000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) 16:05:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe400, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) [ 2917.656788] kauditd_printk_skb: 283 callbacks suppressed [ 2917.656804] audit: type=1400 audit(1563293138.764:102636): avc: denied { map } for pid=12857 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8035000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2917.893468] audit: type=1400 audit(1563293138.724:102634): avc: denied { map } for pid=12855 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:39 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xff00000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2918.092006] audit: type=1400 audit(1563293138.774:102637): avc: denied { map } for pid=12855 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2918.228918] audit: type=1400 audit(1563293138.804:102638): avc: denied { map } for pid=12857 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:05:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000000)=""/90, 0xfffffffffffffdb6, 0x700, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000780), 0xffffffffffffffe6, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="c0dc00000000cfec7be070") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 16:05:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2918.434454] audit: type=1400 audit(1563293138.844:102639): avc: denied { map } for pid=12855 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8100000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2918.632446] audit: type=1400 audit(1563293138.844:102640): avc: denied { map } for pid=12855 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:39 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffffffa0008000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2918.812066] audit: type=1400 audit(1563293138.874:102641): avc: denied { map } for pid=12857 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2918.978598] audit: type=1400 audit(1563293138.884:102642): avc: denied { map } for pid=12859 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2919.142009] audit: type=1400 audit(1563293138.894:102643): avc: denied { map } for pid=12859 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2919.246214] audit: audit_backlog=65 > audit_backlog_limit=64 16:05:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf900, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x86ddffff00000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:40 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffffffa0010000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) 16:05:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x40000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000000)=""/90, 0xfffffffffffffdb6, 0x700, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000780), 0xffffffffffffffe6, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="c0dc00000000cfec7be070") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 16:05:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1fffff, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:42 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffffffa0018000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8847000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) 16:05:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8848000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:42 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffffffa0030000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6b6b6b, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8864000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:43 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:43 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xfffffffffffff000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000000)=""/90, 0xfffffffffffffdb6, 0x700, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000780), 0xffffffffffffffe6, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="c0dc00000000cfec7be070") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2922.683740] kauditd_printk_skb: 234 callbacks suppressed [ 2922.683755] audit: type=1400 audit(1563293143.794:102876): avc: denied { map } for pid=13039 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2922.872017] audit: type=1400 audit(1563293143.824:102877): avc: denied { map } for pid=13039 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:05:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88a8ffff00000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2923.066703] audit: type=1400 audit(1563293143.884:102878): avc: denied { map } for pid=13039 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8000a0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:44 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) [ 2923.302802] audit: type=1400 audit(1563293143.884:102879): avc: denied { map } for pid=13039 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:44 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x2, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2923.541980] audit: type=1400 audit(1563293143.914:102880): avc: denied { map } for pid=13039 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2923.732020] audit: type=1400 audit(1563293143.934:102881): avc: denied { map } for pid=13042 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2923.885140] audit: type=1400 audit(1563293143.944:102882): avc: denied { map } for pid=13039 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8001a0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x88caffff00000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2924.054948] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2924.063328] audit: type=1400 audit(1563293143.944:102883): avc: denied { map } for pid=13042 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2924.128707] audit: audit_lost=1632 audit_rate_limit=0 audit_backlog_limit=64 16:05:45 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:45 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x3, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) 16:05:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000000)=""/90, 0xfffffffffffffdb6, 0x700, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000780), 0xffffffffffffffe6, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="c0dc00000000cfec7be070") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 16:05:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8906000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:46 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x4, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:46 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 16:05:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x8dffffff00000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:47 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x5, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:47 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x280ffff, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:48 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x8, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xf5ffffff00000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2927.698119] kauditd_printk_skb: 235 callbacks suppressed [ 2927.698133] audit: type=1400 audit(1563293148.804:103109): avc: denied { map } for pid=13272 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000000)=""/90, 0xfffffffffffffdb6, 0x700, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000780), 0xffffffffffffffe6, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="c0dc00000000cfec7be070") 16:05:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x01\x00'}, &(0x7f0000000080)=0x1e) 16:05:48 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:49 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x11, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2927.885190] audit: type=1400 audit(1563293148.804:103110): avc: denied { map } for pid=13272 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xff00000000000000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2928.082401] audit: type=1400 audit(1563293148.854:103111): avc: denied { map } for pid=13272 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2928.199543] audit: type=1400 audit(1563293148.884:103112): avc: denied { map } for pid=13272 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2928.374261] audit: type=1400 audit(1563293148.924:103113): avc: denied { map } for pid=13321 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) [ 2928.526096] audit: type=1400 audit(1563293148.924:103114): avc: denied { map } for pid=13321 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:49 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x480ffff, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2928.667763] audit: type=1400 audit(1563293148.944:103115): avc: denied { map } for pid=13272 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) [ 2928.870591] audit: type=1400 audit(1563293148.944:103116): avc: denied { map } for pid=13272 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:50 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x21, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2929.005439] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2929.028238] audit: audit_lost=1636 audit_rate_limit=0 audit_backlog_limit=64 16:05:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffffffa0008000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000000)=""/90, 0xfffffffffffffdb6, 0x700, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000780), 0xffffffffffffffe6, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 16:05:51 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x29, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffffffa0010000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00F\x03\x00'}, &(0x7f0000000080)=0x1e) 16:05:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:51 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x2b, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffffffa0018000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00G\x03\x00'}, &(0x7f0000000080)=0x1e) 16:05:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000000)=""/90, 0xfffffffffffffdb6, 0x700, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000780), 0xffffffffffffffe6, 0x0, 0x0, 0x0) 16:05:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xffffffffa0030000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:53 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x2c, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:53 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x2f, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x03\x00'}, &(0x7f0000000080)=0x1e) [ 2932.714529] kauditd_printk_skb: 225 callbacks suppressed [ 2932.714544] audit: type=1400 audit(1563293153.824:103335): avc: denied { map } for pid=13604 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2932.867781] audit: type=1400 audit(1563293153.854:103336): avc: denied { map } for pid=13604 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2933.040119] audit: type=1400 audit(1563293153.874:103337): avc: denied { map } for pid=13604 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0xfffffffffffff000, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2933.252002] audit: type=1400 audit(1563293153.884:103338): avc: denied { map } for pid=13604 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2933.446887] audit: type=1400 audit(1563293153.904:103339): avc: denied { map } for pid=13604 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:54 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x33, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) [ 2933.642289] audit: type=1400 audit(1563293153.924:103340): avc: denied { map } for pid=13606 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2933.758746] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2933.792840] audit: type=1400 audit(1563293153.924:103341): avc: denied { map } for pid=13606 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2933.804624] audit: audit_lost=1639 audit_rate_limit=0 audit_backlog_limit=64 [ 2933.924212] audit: backlog limit exceeded 16:05:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000000)=""/90, 0xfffffffffffffdb6, 0x700, 0x0, 0x0) 16:05:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x2, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x22000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:55 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x3a, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:05:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x3, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:56 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x3b, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept(r1, 0x0, 0x0) 16:05:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x4, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) 16:05:57 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x3c, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:05:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x5, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:05:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:58 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0xffffff84, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 2937.731309] kauditd_printk_skb: 261 callbacks suppressed [ 2937.731326] audit: type=1400 audit(1563293158.834:103603): avc: denied { map } for pid=13703 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x8, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:05:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x46030000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:05:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(0x0, 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) [ 2937.912916] audit: type=1400 audit(1563293158.884:103604): avc: denied { map } for pid=13700 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:59 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0xffffff88, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2938.100350] audit: type=1400 audit(1563293158.904:103605): avc: denied { map } for pid=13700 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2938.352051] audit: type=1400 audit(1563293158.924:103606): avc: denied { map } for pid=13703 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2938.488332] audit: type=1400 audit(1563293158.924:103608): avc: denied { map } for pid=13703 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x11, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2938.677662] audit: type=1400 audit(1563293158.924:103607): avc: denied { map } for pid=13707 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:05:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x47030000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2938.831472] audit: type=1400 audit(1563293158.944:103609): avc: denied { map } for pid=13700 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(0x0, 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) [ 2939.048742] audit: type=1400 audit(1563293158.954:103610): avc: denied { map } for pid=13700 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:00 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0xffffff89, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2939.139721] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2939.180085] audit: audit_backlog=65 > audit_backlog_limit=64 16:06:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 16:06:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x21, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6b6b6b00, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(0x0, 0x0) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={{}, {0x77359400}}) 16:06:01 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x3, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x80040000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x29, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 16:06:02 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x13, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(0x0, &(0x7f0000000140)={{}, {0x77359400}}) 16:06:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x2b, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:03 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x223, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(0x0, &(0x7f0000000140)={{}, {0x77359400}}) 16:06:03 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa0008000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) 16:06:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2942.757384] kauditd_printk_skb: 275 callbacks suppressed [ 2942.757400] audit: type=1400 audit(1563293163.864:103855): avc: denied { map } for pid=13790 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x2c, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:04 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2942.975342] audit: type=1400 audit(1563293163.874:103856): avc: denied { map } for pid=13790 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2943.112005] audit: type=1400 audit(1563293163.954:103857): avc: denied { map } for pid=13790 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(0x0, &(0x7f0000000140)={{}, {0x77359400}}) [ 2943.302110] audit: type=1400 audit(1563293164.014:103858): avc: denied { map } for pid=13790 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:04 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa0010000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2943.441985] audit: type=1400 audit(1563293164.024:103859): avc: denied { map } for pid=13790 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2943.584288] audit: type=1400 audit(1563293164.084:103860): avc: denied { map } for pid=13790 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x2f, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:04 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x3, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2943.794064] audit: type=1400 audit(1563293164.084:103861): avc: denied { map } for pid=13790 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2943.936111] audit: type=1400 audit(1563293164.164:103862): avc: denied { map } for pid=13796 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) [ 2944.123696] audit: type=1400 audit(1563293164.164:103863): avc: denied { map } for pid=13796 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', 0x0) 16:06:05 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa0018000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2944.254941] audit: type=1400 audit(1563293164.204:103864): avc: denied { map } for pid=13796 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x33, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:06 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x4, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', 0x0) 16:06:06 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa0030000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:06 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x5, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:06:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x3a, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:07 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) utimes(&(0x7f0000000080)='./bus\x00', 0x0) 16:06:07 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x8, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x3b, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:08 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe1010000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x00\x80\x00'}, &(0x7f0000000080)=0x1e) 16:06:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000701000/0x3000)=nil, 0x3000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 16:06:08 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x11, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x3c, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:09 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe4000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2947.824472] kauditd_printk_skb: 200 callbacks suppressed [ 2947.824489] audit: type=1400 audit(1563293168.934:104065): avc: denied { map } for pid=13877 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2948.007255] audit: type=1400 audit(1563293168.934:104066): avc: denied { map } for pid=13877 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2948.221961] audit: type=1400 audit(1563293168.934:104067): avc: denied { map } for pid=13877 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2948.423470] audit: type=1400 audit(1563293168.934:104068): avc: denied { map } for pid=13877 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:09 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 2948.627437] audit: type=1400 audit(1563293168.984:104069): avc: denied { map } for pid=13877 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2948.798499] audit: type=1400 audit(1563293169.034:104070): avc: denied { map } for pid=13877 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:09 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2948.853479] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2948.886947] audit: audit_backlog=65 > audit_backlog_limit=64 16:06:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x01\x80\x00'}, &(0x7f0000000080)=0x1e) [ 2948.901276] audit: audit_lost=1651 audit_rate_limit=0 audit_backlog_limit=64 [ 2948.917765] audit: audit_backlog=65 > audit_backlog_limit=64 16:06:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0xffffff84, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:10 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x29, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:10 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf9000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0xffffff88, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f0000000080)=0x1e) 16:06:11 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff1f00, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0xffffff89, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:12 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:12 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff8002, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x3, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:06:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:13 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff8004, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x13, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2f, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2952.845236] kauditd_printk_skb: 268 callbacks suppressed [ 2952.845250] audit: type=1400 audit(1563293173.954:104325): avc: denied { map } for pid=13961 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 2952.999533] audit: type=1400 audit(1563293173.954:104326): avc: denied { map } for pid=13966 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2953.203321] audit: type=1400 audit(1563293173.964:104327): avc: denied { map } for pid=13966 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) [ 2953.367288] audit: type=1400 audit(1563293173.974:104328): avc: denied { map } for pid=13966 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2953.549470] audit: type=1400 audit(1563293173.984:104329): avc: denied { map } for pid=13966 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x223, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:14 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x33, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2953.755379] audit: type=1400 audit(1563293173.994:104330): avc: denied { map } for pid=13956 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2953.923898] audit: type=1400 audit(1563293174.004:104331): avc: denied { map } for pid=13956 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2954.167962] audit: type=1400 audit(1563293174.014:104332): avc: denied { map } for pid=13962 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:15 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2954.284661] audit: type=1400 audit(1563293174.044:104333): avc: denied { map } for pid=13962 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2954.370312] audit: audit_backlog=65 > audit_backlog_limit=64 16:06:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) 16:06:16 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x3a, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:16 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a0ffffffff, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:16 executing program 1: r0 = socket$unix(0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x3, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:16 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x3b, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:16 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3a0ffffffff, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:06:17 executing program 1: r0 = socket$unix(0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:17 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x3c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x4, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:17 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:18 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff84, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:18 executing program 1: r0 = socket$unix(0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:18 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x5, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) [ 2957.863993] kauditd_printk_skb: 253 callbacks suppressed [ 2957.864008] audit: type=1400 audit(1563293178.974:104567): avc: denied { map } for pid=14050 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2958.062647] audit: type=1400 audit(1563293179.014:104568): avc: denied { map } for pid=14050 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2958.227801] audit: type=1400 audit(1563293179.064:104569): avc: denied { map } for pid=14050 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:19 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6b6b6b00000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:19 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff88, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2958.452239] audit: type=1400 audit(1563293179.064:104570): avc: denied { map } for pid=14050 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:19 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x8, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2958.654009] audit: type=1400 audit(1563293179.114:104571): avc: denied { map } for pid=14050 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:19 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 2958.842226] audit: type=1400 audit(1563293179.154:104572): avc: denied { map } for pid=14051 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2958.870754] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2958.878669] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2958.920875] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2958.952045] audit: audit_lost=1664 audit_rate_limit=0 audit_backlog_limit=64 16:06:20 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff89, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8000a0ffffffff, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 16:06:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x11, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:20 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:20 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:21 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8001a0ffffffff, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:21 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:21 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:21 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 16:06:22 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:22 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x29, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:22 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:22 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:23 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:23 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x6, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 16:06:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:23 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:23 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x280ffff00000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2962.904383] kauditd_printk_skb: 269 callbacks suppressed [ 2962.904397] audit: type=1400 audit(1563293184.014:104831): avc: denied { map } for pid=14138 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2963.092133] audit: type=1400 audit(1563293184.014:104832): avc: denied { map } for pid=14138 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2963.239483] audit: type=1400 audit(1563293184.014:104833): avc: denied { map } for pid=14138 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:24 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x7, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:24 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 2963.397651] audit: type=1400 audit(1563293184.014:104834): avc: denied { map } for pid=14138 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2963.558435] audit: type=1400 audit(1563293184.114:104835): avc: denied { map } for pid=14138 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2963.707790] audit: type=1400 audit(1563293184.114:104836): avc: denied { map } for pid=14138 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:24 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2963.882341] audit: type=1400 audit(1563293184.134:104837): avc: denied { map } for pid=14139 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) [ 2964.037774] audit: type=1400 audit(1563293184.134:104838): avc: denied { map } for pid=14139 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2964.210203] audit: type=1400 audit(1563293184.164:104839): avc: denied { map } for pid=14138 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:25 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 2964.480288] audit: type=1400 audit(1563293184.164:104840): avc: denied { map } for pid=14138 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x480ffff00000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2f, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:26 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:26 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x33, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) 16:06:27 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x28, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:27 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x3a, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\xa0\x00'}, &(0x7f0000000080)=0x1e) 16:06:28 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3c, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:28 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x3b, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xa0\x00'}, &(0x7f0000000080)=0x1e) 16:06:29 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x60, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2967.915703] kauditd_printk_skb: 245 callbacks suppressed [ 2967.915718] audit: type=1400 audit(1563293189.024:105065): avc: denied { map } for pid=14225 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2968.084443] audit: type=1400 audit(1563293189.024:105066): avc: denied { map } for pid=14225 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:29 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x3c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:29 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240), 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 2968.301367] audit: type=1400 audit(1563293189.074:105067): avc: denied { map } for pid=14229 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2968.462031] audit: type=1400 audit(1563293189.084:105068): avc: denied { map } for pid=14229 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2968.591507] audit: type=1400 audit(1563293189.104:105069): avc: denied { map } for pid=14225 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2968.768220] audit: type=1400 audit(1563293189.114:105070): avc: denied { map } for pid=14229 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2968.907121] audit: type=1400 audit(1563293189.114:105071): avc: denied { map } for pid=14229 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:30 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2969.043245] audit: type=1400 audit(1563293189.134:105072): avc: denied { map } for pid=14225 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2969.170994] audit: type=1400 audit(1563293189.154:105073): avc: denied { map } for pid=14225 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff84, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:30 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240), 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2969.312019] audit: type=1400 audit(1563293189.154:105074): avc: denied { map } for pid=14229 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x01\xa0\x00'}, &(0x7f0000000080)=0x1e) 16:06:30 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x1a0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff88, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:31 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240), 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:31 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x300, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xa0\x00'}, &(0x7f0000000080)=0x1e) 16:06:32 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c00000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:32 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff89, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:32 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3a0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:33 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x01\x00'}, &(0x7f0000000080)=0x1e) 16:06:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:33 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x543, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2972.968779] kauditd_printk_skb: 233 callbacks suppressed [ 2972.968795] audit: type=1400 audit(1563293194.074:105308): avc: denied { map } for pid=14308 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2973.157237] audit: type=1400 audit(1563293194.074:105309): avc: denied { map } for pid=14308 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:34 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2973.313499] audit: type=1400 audit(1563293194.164:105310): avc: denied { map } for pid=14308 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 2973.485419] audit: type=1400 audit(1563293194.174:105311): avc: denied { map } for pid=14308 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2973.665132] audit: type=1400 audit(1563293194.244:105312): avc: denied { map } for pid=14308 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:34 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x600, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2973.836783] audit: type=1400 audit(1563293194.264:105313): avc: denied { map } for pid=14308 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x03\x00'}, &(0x7f0000000080)=0x1e) [ 2974.023197] audit: type=1400 audit(1563293194.334:105314): avc: denied { map } for pid=14314 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4603000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2974.212049] audit: type=1400 audit(1563293194.334:105315): avc: denied { map } for pid=14314 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:35 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2974.396628] audit: type=1400 audit(1563293194.384:105316): avc: denied { map } for pid=14314 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 2974.547690] audit: type=1400 audit(1563293194.404:105317): avc: denied { map } for pid=14316 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x6, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:36 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x608, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4703000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:36 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:06:36 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x689, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8004000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x7, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:37 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, 0x0, 0x0) 16:06:37 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x700, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x00\x80\x00'}, &(0x7f0000000080)=0x1e) 16:06:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, 0x0, 0x0) 16:06:38 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:38 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x806, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe101000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2977.998709] kauditd_printk_skb: 246 callbacks suppressed [ 2977.998726] audit: type=1400 audit(1563293199.104:105549): avc: denied { map } for pid=14390 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2978.287137] audit: type=1400 audit(1563293199.114:105550): avc: denied { map } for pid=14392 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:39 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2978.400368] audit: type=1400 audit(1563293199.114:105551): avc: denied { map } for pid=14392 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, 0x0, 0x0) 16:06:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe400000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2978.580975] audit: type=1400 audit(1563293199.174:105552): avc: denied { map } for pid=14392 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:39 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xd00, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x01\x80\x00'}, &(0x7f0000000080)=0x1e) [ 2978.765845] audit: type=1400 audit(1563293199.194:105553): avc: denied { map } for pid=14392 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x28, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2978.942767] audit: type=1400 audit(1563293199.194:105554): avc: denied { map } for pid=14392 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2979.162109] audit: type=1400 audit(1563293199.224:105555): avc: denied { map } for pid=14390 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2979.311264] audit: type=1400 audit(1563293199.224:105556): avc: denied { map } for pid=14390 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2979.480406] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2979.487981] audit: audit_backlog=65 > audit_backlog_limit=64 16:06:40 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 16:06:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f0000000080)=0x1e) 16:06:40 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xe80, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3c, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf900000000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:41 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 16:06:41 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x60, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:06:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 16:06:42 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2800, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:42 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff1f0000000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:43 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={0x0}}, 0x0) 16:06:43 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3580, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x1a0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) [ 2983.026752] kauditd_printk_skb: 241 callbacks suppressed [ 2983.026767] audit: type=1400 audit(1563293204.134:105794): avc: denied { map } for pid=14475 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:44 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2983.201229] audit: type=1400 audit(1563293204.144:105795): avc: denied { map } for pid=14477 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={0x0}}, 0x0) [ 2983.368120] audit: type=1400 audit(1563293204.194:105796): avc: denied { map } for pid=14475 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffa0008000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:44 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3c00, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x300, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2983.512015] audit: type=1400 audit(1563293204.194:105797): avc: denied { map } for pid=14475 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2983.661991] audit: type=1400 audit(1563293204.214:105798): avc: denied { map } for pid=14477 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2983.821478] audit: type=1400 audit(1563293204.224:105799): avc: denied { map } for pid=14477 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2983.944309] audit: type=1400 audit(1563293204.224:105800): avc: denied { map } for pid=14475 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffa0010000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2984.142042] audit: type=1400 audit(1563293204.274:105801): avc: denied { map } for pid=14477 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) 16:06:45 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2984.342361] audit: type=1400 audit(1563293204.284:105802): avc: denied { map } for pid=14477 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3a0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2984.435861] audit: audit_backlog=65 > audit_backlog_limit=64 16:06:45 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3f00, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={0x0}}, 0x0) 16:06:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffa0018000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x543, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:46 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x4000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:46 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffa0030000, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:06:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:47 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x4305, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x600, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:47 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:06:48 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x4788, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:48 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) 16:06:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x608, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2988.084973] kauditd_printk_skb: 240 callbacks suppressed [ 2988.084989] audit: type=1400 audit(1563293209.194:106029): avc: denied { map } for pid=14565 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2988.259689] audit: type=1400 audit(1563293209.194:106030): avc: denied { map } for pid=14565 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev}}}, 0xb8}}, 0x0) [ 2988.442181] audit: type=1400 audit(1563293209.234:106031): avc: denied { map } for pid=14564 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x689, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:49 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x4888, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2988.631080] audit: type=1400 audit(1563293209.234:106032): avc: denied { map } for pid=14564 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2988.798983] gfs2: not a GFS2 filesystem [ 2988.839433] audit: type=1400 audit(1563293209.284:106033): avc: denied { map } for pid=14565 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:50 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 16:06:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2989.063041] audit: type=1400 audit(1563293209.284:106034): avc: denied { map } for pid=14565 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2989.207677] audit: type=1400 audit(1563293209.294:106035): avc: denied { map } for pid=14566 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2989.268484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2989.301646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2989.331672] audit: audit_lost=1688 audit_rate_limit=0 audit_backlog_limit=64 16:06:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev}}}, 0xb8}}, 0x0) 16:06:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x700, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:50 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x6000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2990.075748] gfs2: not a GFS2 filesystem 16:06:51 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, 0x0, 0x0) [ 2990.256529] gfs2: not a GFS2 filesystem 16:06:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f00000073c0)=@updpolicy={0xb8, 0x19, 0xa25, 0x0, 0x0, {{@in6=@local, @in6=@dev}}}, 0xb8}}, 0x0) 16:06:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x806, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 16:06:51 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x6488, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:52 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, 0x0, 0x0) [ 2991.354601] gfs2: not a GFS2 filesystem [ 2991.465724] gfs2: not a GFS2 filesystem 16:06:52 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:06:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xd00, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:53 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x800e, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 16:06:53 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, 0x0, 0x0) 16:06:53 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:06:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xe80, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2992.636618] gfs2: not a GFS2 filesystem [ 2992.777020] gfs2: not a GFS2 filesystem 16:06:54 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8035, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2993.126524] kauditd_printk_skb: 262 callbacks suppressed [ 2993.126540] audit: type=1400 audit(1563293214.234:106289): avc: denied { map } for pid=14666 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2993.321285] audit: type=1400 audit(1563293214.234:106290): avc: denied { map } for pid=14666 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) 16:06:54 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) [ 2993.561989] audit: type=1400 audit(1563293214.244:106291): avc: denied { map } for pid=14667 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:54 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2993.722468] audit: type=1400 audit(1563293214.264:106292): avc: denied { map } for pid=14667 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2993.878618] audit: type=1400 audit(1563293214.304:106293): avc: denied { map } for pid=14667 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:55 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8100, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2994.032386] audit: type=1400 audit(1563293214.304:106295): avc: denied { map } for pid=14668 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2994.124777] gfs2: not a GFS2 filesystem [ 2994.208659] audit: type=1400 audit(1563293214.304:106294): avc: denied { map } for pid=14667 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2994.391774] audit: type=1400 audit(1563293214.324:106296): avc: denied { map } for pid=14668 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2994.538403] audit: type=1400 audit(1563293214.354:106297): avc: denied { map } for pid=14668 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2994.636143] audit: audit_backlog=65 > audit_backlog_limit=64 16:06:55 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:06:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) 16:06:55 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2800, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:56 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8847, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2995.402024] gfs2: not a GFS2 filesystem [ 2995.522174] gfs2: not a GFS2 filesystem 16:06:56 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:06:56 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16:06:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3580, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:57 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8848, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:06:57 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:06:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3c00, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, 0x0, 0x0) 16:06:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2c, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:06:58 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8864, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:06:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3f00, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:58 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$sndseq(r0, &(0x7f00000003c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0x30) write$P9_RFLUSH(r0, &(0x7f0000000040)={0x7}, 0x7) 16:06:58 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:06:58 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8906, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:06:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xe4, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2998.145452] kauditd_printk_skb: 221 callbacks suppressed [ 2998.145468] audit: type=1400 audit(1563293219.254:106508): avc: denied { map } for pid=14761 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) [ 2998.305678] audit: type=1400 audit(1563293219.254:106509): avc: denied { map } for pid=14763 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:59 executing program 4: r0 = dup(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:06:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x4000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2998.435485] audit: type=1400 audit(1563293219.254:106510): avc: denied { map } for pid=14763 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2998.582021] audit: type=1400 audit(1563293219.254:106511): avc: denied { map } for pid=14763 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2998.697324] audit: type=1400 audit(1563293219.254:106512): avc: denied { map } for pid=14763 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:06:59 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) [ 2998.892198] audit: type=1400 audit(1563293219.304:106513): avc: denied { map } for pid=14761 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2999.030654] audit: type=1400 audit(1563293219.334:106514): avc: denied { map } for pid=14763 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf9, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 2999.136100] audit: type=1400 audit(1563293219.374:106515): avc: denied { map } for pid=14763 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:00 executing program 4: r0 = dup(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) [ 2999.272226] audit: type=1400 audit(1563293219.374:106516): avc: denied { map } for pid=14761 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x4305, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2999.488391] audit: type=1400 audit(1563293219.384:106517): avc: denied { map } for pid=14761 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:00 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xff00, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:01 executing program 4: r0 = dup(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:07:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x01\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:07:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x4788, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:01 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8000a0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:02 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:07:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1e1, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x4888, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:02 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8001a0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:07:03 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x346, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x6000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:03 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:07:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) shutdown(r0, 0x0) 16:07:03 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf0ffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3003.160769] kauditd_printk_skb: 258 callbacks suppressed [ 3003.160808] audit: type=1400 audit(1563293224.264:106776): avc: denied { map } for pid=14861 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.379383] audit: type=1400 audit(1563293224.284:106777): avc: denied { map } for pid=14861 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.553347] audit: type=1400 audit(1563293224.324:106778): avc: denied { map } for pid=14861 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x6488, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) [ 3003.757982] audit: type=1400 audit(1563293224.384:106779): avc: denied { map } for pid=14861 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.800199] gfs2: not a GFS2 filesystem 16:07:05 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x1000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) shutdown(r0, 0x0) [ 3003.940065] audit: type=1400 audit(1563293224.404:106780): avc: denied { map } for pid=14861 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3003.958421] gfs2: not a GFS2 filesystem 16:07:05 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x347, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3004.179289] audit: type=1400 audit(1563293224.484:106781): avc: denied { map } for pid=14861 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3004.357198] audit: type=1400 audit(1563293224.494:106782): avc: denied { map } for pid=14861 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3004.405198] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3004.428896] audit: audit_lost=1696 audit_rate_limit=0 audit_backlog_limit=64 [ 3004.443767] audit: audit_backlog=65 > audit_backlog_limit=64 16:07:05 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:07:05 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) shutdown(r0, 0x0) 16:07:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x800e, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3005.030793] gfs2: not a GFS2 filesystem [ 3005.152835] gfs2: not a GFS2 filesystem 16:07:06 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3a0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) 16:07:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8035, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:07 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:07 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:07:07 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x480, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:07 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x6000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:08 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:07:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8100, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) [ 3007.602388] gfs2: not a GFS2 filesystem [ 3007.732292] gfs2: not a GFS2 filesystem 16:07:08 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x7000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:08 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:09 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:07:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8847, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3008.181538] kauditd_printk_skb: 289 callbacks suppressed [ 3008.181554] audit: type=1400 audit(1563293229.284:107057): avc: denied { map } for pid=14974 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3008.188744] audit: type=1400 audit(1563293229.304:107058): avc: denied { map } for pid=14974 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:09 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) [ 3008.464335] audit: type=1400 audit(1563293229.354:107059): avc: denied { map } for pid=14974 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) [ 3008.708126] audit: type=1400 audit(1563293229.414:107060): avc: denied { map } for pid=14974 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:10 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) [ 3008.891822] audit: type=1400 audit(1563293229.414:107061): avc: denied { map } for pid=14974 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:10 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3008.997710] gfs2: not a GFS2 filesystem [ 3009.121282] audit: type=1400 audit(1563293229.444:107062): avc: denied { map } for pid=14974 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3009.232067] gfs2: not a GFS2 filesystem 16:07:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8848, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3009.285798] audit: type=1400 audit(1563293229.644:107063): avc: denied { map } for pid=14979 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:10 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:10 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) [ 3009.461988] audit: type=1400 audit(1563293229.654:107064): avc: denied { map } for pid=14979 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3009.623277] audit: type=1400 audit(1563293229.654:107065): avc: denied { map } for pid=14980 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3009.670838] audit: audit_backlog=65 > audit_backlog_limit=64 16:07:11 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8060000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) 16:07:11 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:07:11 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) [ 3010.274132] gfs2: not a GFS2 filesystem 16:07:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8864, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3010.406901] gfs2: not a GFS2 filesystem 16:07:11 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x900, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:12 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:07:12 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:12 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xd000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8906, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 3011.532385] gfs2: not a GFS2 filesystem [ 3011.677117] gfs2: not a GFS2 filesystem 16:07:12 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) connect$inet6(r1, 0x0, 0x0) 16:07:12 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x20000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:13 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:13 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) connect$inet6(r1, 0x0, 0x0) 16:07:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2200, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x01\x00'}, &(0x7f0000000080)=0x1e) [ 3013.190478] kauditd_printk_skb: 256 callbacks suppressed [ 3013.190492] audit: type=1400 audit(1563293234.294:107308): avc: denied { map } for pid=15070 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:14 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x28000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3013.385481] audit: type=1400 audit(1563293234.294:107309): avc: denied { map } for pid=15071 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xff00, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:14 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) connect$inet6(r1, 0x0, 0x0) [ 3013.623149] audit: type=1400 audit(1563293234.294:107310): avc: denied { map } for pid=15075 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3013.846080] audit: type=1400 audit(1563293234.314:107311): avc: denied { map } for pid=15075 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3014.001425] audit: type=1400 audit(1563293234.314:107312): avc: denied { map } for pid=15075 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2c00, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3014.229915] audit: type=1400 audit(1563293234.344:107313): avc: denied { map } for pid=15075 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:15 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) [ 3014.388773] audit: type=1400 audit(1563293234.344:107314): avc: denied { map } for pid=15071 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3014.423644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3014.427384] audit: audit_backlog=65 > audit_backlog_limit=64 16:07:15 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3c000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3014.449332] audit: audit_backlog=65 > audit_backlog_limit=64 16:07:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) 16:07:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8000a0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:16 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3f000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:16 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8001a0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\x03\x00'}, &(0x7f0000000080)=0x1e) 16:07:17 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x40000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:18 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:18 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf0ffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\x03\x00'}, &(0x7f0000000080)=0x1e) 16:07:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:18 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x43050000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3017.984628] gfs2: not a GFS2 filesystem 16:07:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x1000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:19 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4603, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:19 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) [ 3018.291968] kauditd_printk_skb: 297 callbacks suppressed [ 3018.291982] audit: type=1400 audit(1563293239.394:107582): avc: denied { map } for pid=15164 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3018.447768] audit: type=1400 audit(1563293239.404:107583): avc: denied { map } for pid=15164 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) [ 3018.610057] audit: type=1400 audit(1563293239.404:107584): avc: denied { map } for pid=15164 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3018.771179] audit: type=1400 audit(1563293239.404:107585): avc: denied { map } for pid=15164 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:19 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x60000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3018.907446] gfs2: not a GFS2 filesystem [ 3018.952225] audit: type=1400 audit(1563293239.464:107586): avc: denied { map } for pid=15164 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3019.065001] gfs2: not a GFS2 filesystem [ 3019.119119] audit: type=1400 audit(1563293239.484:107587): avc: denied { map } for pid=15165 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4703, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3019.256675] audit: type=1400 audit(1563293239.484:107588): avc: denied { map } for pid=15165 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x03\x00'}, &(0x7f0000000080)=0x1e) [ 3019.415126] audit: type=1400 audit(1563293239.514:107589): avc: denied { map } for pid=15165 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3019.527322] audit: type=1400 audit(1563293239.514:107590): avc: denied { map } for pid=15165 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) [ 3019.634001] audit: audit_backlog=65 > audit_backlog_limit=64 16:07:21 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x800e0000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:21 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) [ 3020.151783] gfs2: not a GFS2 filesystem 16:07:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3020.286392] gfs2: not a GFS2 filesystem 16:07:21 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:07:22 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x80350000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x6000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:22 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xe101, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, 0x0, 0x0) shutdown(r0, 0x0) 16:07:22 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) 16:07:22 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x81000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x7000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) 16:07:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, 0x0, 0x0) shutdown(r0, 0x0) 16:07:23 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xe400, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:24 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x86ddffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3023.307525] kauditd_printk_skb: 258 callbacks suppressed [ 3023.307539] audit: type=1400 audit(1563293244.414:107838): avc: denied { map } for pid=15249 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:24 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) [ 3023.548618] audit: type=1400 audit(1563293244.464:107839): avc: denied { map } for pid=15250 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, 0x0, 0x0) shutdown(r0, 0x0) 16:07:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 3023.708249] audit: type=1400 audit(1563293244.474:107840): avc: denied { map } for pid=15250 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:25 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88470000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8060000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3023.927746] audit: type=1400 audit(1563293244.494:107841): avc: denied { map } for pid=15250 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3024.213095] audit: type=1400 audit(1563293244.524:107842): avc: denied { map } for pid=15250 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3024.406284] audit: type=1400 audit(1563293244.584:107843): avc: denied { map } for pid=15250 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) [ 3024.588569] audit: type=1400 audit(1563293244.644:107844): avc: denied { map } for pid=15250 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:25 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) [ 3024.727551] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3024.743345] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3024.763036] audit: audit_lost=1722 audit_rate_limit=0 audit_backlog_limit=64 16:07:26 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88480000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xd000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf900, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 16:07:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 16:07:26 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) 16:07:26 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88640000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x20000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 16:07:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 16:07:27 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) 16:07:27 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88a8ffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x28000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:28 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88caffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:28 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) 16:07:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3c000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:29 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x89060000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) [ 3028.337864] kauditd_printk_skb: 243 callbacks suppressed [ 3028.337880] audit: type=1400 audit(1563293249.444:108085): avc: denied { map } for pid=15349 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3028.537695] audit: type=1400 audit(1563293249.444:108086): avc: denied { map } for pid=15344 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3028.770766] audit: type=1400 audit(1563293249.444:108087): avc: denied { map } for pid=15344 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3f000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3028.963956] audit: type=1400 audit(1563293249.484:108088): avc: denied { map } for pid=15344 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3029.122005] audit: type=1400 audit(1563293249.514:108089): avc: denied { map } for pid=15347 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:30 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) [ 3029.323133] audit: type=1400 audit(1563293249.514:108090): avc: denied { map } for pid=15347 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3029.368633] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3029.386997] audit: audit_backlog=65 > audit_backlog_limit=64 16:07:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) 16:07:30 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8dffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3029.423010] audit: audit_lost=1724 audit_rate_limit=0 audit_backlog_limit=64 [ 3029.432162] audit: audit_backlog=65 > audit_backlog_limit=64 16:07:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) 16:07:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x40000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:31 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xa0008000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8001a0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x43050000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:32 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:07:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) 16:07:32 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xa0010000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:32 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x60000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:33 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xa0018000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:33 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x00\x80\x00'}, &(0x7f0000000080)=0x1e) [ 3032.816973] gfs2: not a GFS2 filesystem 16:07:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x800e0000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:34 executing program 1: msgsnd(0x0, &(0x7f0000000000)={0x1, "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"}, 0xfd1, 0x800) [ 3033.352954] kauditd_printk_skb: 284 callbacks suppressed [ 3033.352969] audit: type=1400 audit(1563293254.464:108364): avc: denied { map } for pid=15435 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3033.537317] audit: type=1400 audit(1563293254.464:108365): avc: denied { map } for pid=15435 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:34 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xa0030000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3033.716597] audit: type=1400 audit(1563293254.464:108366): avc: denied { map } for pid=15435 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:34 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) [ 3033.922035] audit: type=1400 audit(1563293254.544:108367): avc: denied { map } for pid=15435 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3034.038045] gfs2: not a GFS2 filesystem 16:07:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x80350000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3034.145537] audit: type=1400 audit(1563293254.544:108368): avc: denied { map } for pid=15435 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:35 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r1 = getpgrp(0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000240)) 16:07:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x280ffff, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3034.370850] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3034.401983] audit: type=1400 audit(1563293254.604:108369): avc: denied { map } for pid=15436 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3034.481994] audit: audit_lost=1729 audit_rate_limit=0 audit_backlog_limit=64 [ 3034.540602] audit: backlog limit exceeded [ 3034.551986] audit: type=1400 audit(1563293254.604:108370): avc: denied { map } for pid=15436 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x01\x80\x00'}, &(0x7f0000000080)=0x1e) 16:07:35 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf5ffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x81000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:36 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xff000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:37 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r1 = getpgrp(0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000240)) 16:07:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f0000000080)=0x1e) 16:07:37 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) [ 3036.423895] gfs2: not a GFS2 filesystem 16:07:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x86ddffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:37 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffa888, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3036.584451] gfs2: not a GFS2 filesystem 16:07:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x480ffff, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:38 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:38 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r1 = getpgrp(0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000240)) 16:07:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88470000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:38 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffca88, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:07:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:39 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x0) 16:07:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88480000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:39 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r1 = getpgrp(0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000240)) [ 3038.370466] kauditd_printk_skb: 262 callbacks suppressed [ 3038.370481] audit: type=1400 audit(1563293259.474:108633): avc: denied { map } for pid=15621 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3038.513919] audit: type=1400 audit(1563293259.544:108634): avc: denied { map } for pid=15621 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:39 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffdd86, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3038.748427] audit: type=1400 audit(1563293259.544:108635): avc: denied { map } for pid=15621 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3038.888227] audit: type=1400 audit(1563293259.604:108636): avc: denied { map } for pid=15621 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3038.922885] gfs2: not a GFS2 filesystem 16:07:40 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, 0x0, 0x0) shutdown(r0, 0x0) [ 3039.058311] audit: type=1400 audit(1563293259.614:108637): avc: denied { map } for pid=15621 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3039.074302] gfs2: not a GFS2 filesystem 16:07:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) 16:07:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3039.262348] audit: type=1400 audit(1563293259.694:108638): avc: denied { map } for pid=15621 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3039.407928] audit: type=1400 audit(1563293259.694:108639): avc: denied { map } for pid=15621 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88640000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x0, 0x0) getpgrp(0x0) [ 3039.611981] audit: type=1400 audit(1563293259.754:108640): avc: denied { map } for pid=15631 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:40 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xfffff000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3039.767761] audit: type=1400 audit(1563293259.754:108641): avc: denied { map } for pid=15631 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3039.908197] audit: type=1400 audit(1563293259.764:108642): avc: denied { map } for pid=15621 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:41 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, 0x0, 0x0) shutdown(r0, 0x0) [ 3040.270935] gfs2: not a GFS2 filesystem [ 3040.426537] gfs2: not a GFS2 filesystem 16:07:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88a8ffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:41 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x0, 0x0) 16:07:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) 16:07:41 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffff8d, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:42 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, 0x0, 0x0) shutdown(r0, 0x0) [ 3041.382388] gfs2: not a GFS2 filesystem 16:07:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88caffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:42 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) [ 3041.517646] gfs2: not a GFS2 filesystem 16:07:42 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 16:07:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x9000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:42 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xfffffff5, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:07:43 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) 16:07:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x89060000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:43 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x1a0ffffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:43 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) [ 3042.772473] gfs2: not a GFS2 filesystem [ 3042.932134] gfs2: not a GFS2 filesystem 16:07:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3043.372761] kauditd_printk_skb: 239 callbacks suppressed [ 3043.372779] audit: type=1400 audit(1563293264.484:108882): avc: denied { map } for pid=15707 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:44 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) [ 3043.541367] audit: type=1400 audit(1563293264.524:108883): avc: denied { map } for pid=15707 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8dffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:44 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3a0ffffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3043.719166] audit: type=1400 audit(1563293264.544:108884): avc: denied { map } for pid=15714 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3043.852109] audit: type=1400 audit(1563293264.544:108885): avc: denied { map } for pid=15707 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3043.912373] gfs2: not a GFS2 filesystem 16:07:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) [ 3044.054831] audit: type=1400 audit(1563293264.544:108886): avc: denied { map } for pid=15714 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x22000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3044.201976] audit: type=1400 audit(1563293264.584:108887): avc: denied { map } for pid=15714 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3044.324984] audit: type=1400 audit(1563293264.584:108888): avc: denied { map } for pid=15714 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:45 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) 16:07:45 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) [ 3044.546008] audit: type=1400 audit(1563293264.604:108889): avc: denied { map } for pid=15707 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:45 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8000a0ffffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xa0008000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3044.739686] audit: type=1400 audit(1563293264.624:108890): avc: denied { map } for pid=15707 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3044.955382] audit: type=1400 audit(1563293264.624:108891): avc: denied { map } for pid=15714 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3045.120864] gfs2: not a GFS2 filesystem [ 3045.298035] gfs2: not a GFS2 filesystem 16:07:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2c000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:46 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8001a0ffffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 16:07:46 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) 16:07:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xa0010000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3046.202208] gfs2: not a GFS2 filesystem 16:07:47 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf0ffffffffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) 16:07:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xa0018000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:48 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) 16:07:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 16:07:48 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x100000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3047.492350] gfs2: not a GFS2 filesystem 16:07:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xa0030000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) [ 3048.408802] kauditd_printk_skb: 227 callbacks suppressed [ 3048.408819] audit: type=1400 audit(1563293269.514:109107): avc: denied { map } for pid=15795 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:49 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x200000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000109000/0x2000)=nil, 0x2000, 0x0) munmap(&(0x7f0000109000/0x2000)=nil, 0x2000) [ 3048.659802] audit: type=1400 audit(1563293269.564:109108): avc: denied { map } for pid=15791 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3048.716971] gfs2: not a GFS2 filesystem 16:07:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) [ 3048.896632] gfs2: not a GFS2 filesystem [ 3048.899627] audit: type=1400 audit(1563293269.584:109109): avc: denied { map } for pid=15792 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x46030000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) [ 3049.102467] audit: type=1400 audit(1563293269.584:109110): avc: denied { map } for pid=15792 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf5ffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3049.281975] audit: type=1400 audit(1563293269.604:109111): avc: denied { map } for pid=15795 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3049.502014] audit: type=1400 audit(1563293269.614:109112): avc: denied { map } for pid=15795 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:50 executing program 4: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) [ 3049.632080] audit: type=1400 audit(1563293269.614:109113): avc: denied { map } for pid=15791 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3049.698599] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3049.724195] audit: audit_lost=1734 audit_rate_limit=0 audit_backlog_limit=64 [ 3049.735968] audit: audit_backlog=65 > audit_backlog_limit=64 16:07:50 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x300000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) 16:07:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xff000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x47030000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 16:07:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) 16:07:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffa888, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) 16:07:52 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x600000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 16:07:52 executing program 1: socket$netlink(0x10, 0x3, 0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) 16:07:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffca88, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:52 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x700000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) 16:07:53 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 16:07:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x80040000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:53 executing program 1: socket$netlink(0x10, 0x3, 0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) 16:07:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffdd86, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:54 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x800000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3053.412036] kauditd_printk_skb: 255 callbacks suppressed [ 3053.412050] audit: type=1400 audit(1563293274.504:109362): avc: denied { map } for pid=15890 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:54 executing program 1: socket$netlink(0x10, 0x3, 0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) [ 3053.536093] audit: type=1400 audit(1563293274.554:109364): avc: denied { map } for pid=15890 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) [ 3053.682580] audit: type=1400 audit(1563293274.564:109365): avc: denied { map } for pid=15890 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\xa0\x00'}, &(0x7f0000000080)=0x1e) 16:07:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xfffff000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3053.855760] audit: type=1400 audit(1563293274.564:109366): avc: denied { map } for pid=15890 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3054.022036] audit: type=1400 audit(1563293274.614:109367): avc: denied { map } for pid=15890 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:55 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x806000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3054.201222] audit: type=1400 audit(1563293274.644:109368): avc: denied { map } for pid=15890 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3054.330434] audit: type=1400 audit(1563293274.644:109369): avc: denied { map } for pid=15890 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, 0x0, 0x0) [ 3054.498623] audit: type=1400 audit(1563293274.714:109370): avc: denied { map } for pid=15890 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa0008000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3054.676600] audit: type=1400 audit(1563293274.724:109371): avc: denied { map } for pid=15890 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffff8d, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3054.862006] audit: type=1400 audit(1563293274.774:109372): avc: denied { map } for pid=15898 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:56 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xd00000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xa0\x00'}, &(0x7f0000000080)=0x1e) 16:07:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, 0x0, 0x0) 16:07:56 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) 16:07:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xfffffff5, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa0010000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:57 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2000000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, 0x0, 0x0) 16:07:57 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) 16:07:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x01\xa0\x00'}, &(0x7f0000000080)=0x1e) 16:07:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x1a0ffffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa0018000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:58 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2800000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080), 0x0) 16:07:58 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) 16:07:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3a0ffffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa0030000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:07:59 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3c00000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:07:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xa0\x00'}, &(0x7f0000000080)=0x1e) 16:07:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080), 0x0) 16:07:59 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) [ 3058.463581] kauditd_printk_skb: 261 callbacks suppressed [ 3058.463598] audit: type=1400 audit(1563293279.574:109610): avc: denied { map } for pid=15979 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:07:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8000a0ffffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3058.627961] audit: type=1400 audit(1563293279.584:109611): avc: denied { map } for pid=15982 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3058.824021] audit: type=1400 audit(1563293279.584:109612): avc: denied { map } for pid=15982 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3059.022022] audit: type=1400 audit(1563293279.614:109613): avc: denied { map } for pid=15979 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3059.122949] audit: type=1400 audit(1563293279.644:109614): avc: denied { map } for pid=15982 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3059.270165] audit: type=1400 audit(1563293279.644:109615): avc: denied { map } for pid=15982 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:00 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3f00000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080), 0x0) [ 3059.407944] audit: type=1400 audit(1563293279.674:109616): avc: denied { map } for pid=15979 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3059.548101] audit: type=1400 audit(1563293279.684:109617): avc: denied { map } for pid=15986 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8001a0ffffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3059.715035] audit: type=1400 audit(1563293279.684:109618): avc: denied { map } for pid=15986 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x01\x00'}, &(0x7f0000000080)=0x1e) [ 3059.875180] audit: type=1400 audit(1563293279.714:109619): avc: denied { map } for pid=15979 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3060.088788] gfs2: not a GFS2 filesystem 16:08:01 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) [ 3060.236364] gfs2: not a GFS2 filesystem 16:08:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{0x0}], 0x1) 16:08:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xe1010000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:01 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x4000000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf0ffffffffffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x03\x00'}, &(0x7f0000000080)=0x1e) 16:08:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{0x0}], 0x1) 16:08:02 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x4305000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xe4000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x100000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:02 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) 16:08:03 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x6000000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{0x0}], 0x1) 16:08:03 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x200000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) [ 3063.475486] kauditd_printk_skb: 293 callbacks suppressed [ 3063.475502] audit: type=1400 audit(1563293284.584:109886): avc: denied { map } for pid=16082 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)}], 0x1) 16:08:04 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) 16:08:04 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x800e000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3063.693957] audit: type=1400 audit(1563293284.634:109887): avc: denied { map } for pid=16082 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3063.843141] audit: type=1400 audit(1563293284.684:109888): avc: denied { map } for pid=16086 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:05 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf9000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x300000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3064.037611] audit: type=1400 audit(1563293284.684:109889): avc: denied { map } for pid=16086 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3064.238706] audit: type=1400 audit(1563293284.704:109890): avc: denied { map } for pid=16082 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3064.431488] audit: type=1400 audit(1563293284.704:109891): avc: denied { map } for pid=16082 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:05 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8035000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:05 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) 16:08:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)}], 0x1) [ 3064.614097] audit: type=1400 audit(1563293284.724:109892): avc: denied { map } for pid=16086 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3064.640559] audit: audit_backlog=65 > audit_backlog_limit=64 16:08:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x00\x80\x00'}, &(0x7f0000000080)=0x1e) [ 3064.669529] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3064.690753] audit: audit_backlog=65 > audit_backlog_limit=64 16:08:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x600000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:06 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffff1f00, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:06 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8100000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)}], 0x1) 16:08:06 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) 16:08:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x700000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:07 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffff8002, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x01\x80\x00'}, &(0x7f0000000080)=0x1e) 16:08:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) 16:08:07 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x86ddffff00000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e0", 0x24}], 0x1) 16:08:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x800000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:08 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffff8004, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:08 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8847000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e0", 0x24}], 0x1) 16:08:08 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) 16:08:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f0000000080)=0x1e) 16:08:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x806000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:09 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8848000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:09 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)={0x2, 0x0, @local}, 0x10) 16:08:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e0", 0x24}], 0x1) [ 3068.522133] kauditd_printk_skb: 285 callbacks suppressed [ 3068.522147] audit: type=1400 audit(1563293289.634:110148): avc: denied { map } for pid=16186 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3068.670971] audit: type=1400 audit(1563293289.664:110149): avc: denied { map } for pid=16186 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3068.841444] audit: type=1400 audit(1563293289.664:110150): avc: denied { map } for pid=16186 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xd00000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3069.005098] audit: type=1400 audit(1563293289.664:110151): avc: denied { map } for pid=16186 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:10 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8864000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3069.174577] audit: type=1400 audit(1563293289.704:110152): avc: denied { map } for pid=16175 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:10 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, 0x0, 0x0) 16:08:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) [ 3069.333520] audit: type=1400 audit(1563293289.704:110153): avc: denied { map } for pid=16175 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3c", 0x36}], 0x1) 16:08:10 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3069.579719] audit: type=1400 audit(1563293289.714:110154): avc: denied { map } for pid=16186 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3069.732069] audit: type=1400 audit(1563293289.764:110155): avc: denied { map } for pid=16186 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3069.876574] audit: type=1400 audit(1563293289.814:110156): avc: denied { map } for pid=16186 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2000000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3070.065004] audit: type=1400 audit(1563293289.864:110157): avc: denied { map } for pid=16186 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:11 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88a8ffff00000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:11 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, 0x0, 0x0) 16:08:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3c", 0x36}], 0x1) 16:08:11 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a0ffffffff, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) 16:08:12 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88caffff00000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:12 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, 0x0, 0x0) 16:08:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2800000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3c", 0x36}], 0x1) 16:08:12 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3a0ffffffff, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8906000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:13 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x7, &(0x7f0000000000)) 16:08:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3c00000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) 16:08:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600", 0x3f}], 0x1) 16:08:14 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8dffffff00000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x3f00000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600", 0x3f}], 0x1) [ 3073.550336] kauditd_printk_skb: 257 callbacks suppressed [ 3073.550350] audit: type=1400 audit(1563293294.654:110400): avc: denied { map } for pid=16300 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3073.723500] audit: type=1400 audit(1563293294.664:110401): avc: denied { map } for pid=16303 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3073.878016] audit: type=1400 audit(1563293294.694:110402): avc: denied { map } for pid=16300 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:15 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf5ffffff00000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x4000000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) [ 3074.113418] audit: type=1400 audit(1563293294.724:110403): avc: denied { map } for pid=16296 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3074.274302] audit: type=1400 audit(1563293294.724:110404): avc: denied { map } for pid=16303 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3074.532112] audit: type=1400 audit(1563293294.724:110405): avc: denied { map } for pid=16296 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600", 0x3f}], 0x1) [ 3074.759524] audit: type=1400 audit(1563293294.724:110406): avc: denied { map } for pid=16303 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3074.845647] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3074.851528] audit: audit_lost=1770 audit_rate_limit=0 audit_backlog_limit=64 [ 3074.907404] audit: audit_backlog=65 > audit_backlog_limit=64 16:08:16 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xff00000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:16 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x4305000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff", 0x44}], 0x1) 16:08:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) 16:08:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:16 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffffffa0008000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:17 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a0ffffffff, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x6000000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff", 0x44}], 0x1) 16:08:17 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffffffa0010000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 16:08:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x800e000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:18 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8001a0ffffffff, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff", 0x44}], 0x1) 16:08:18 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffffffa0018000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8035000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:19 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7", 0x46}], 0x1) 16:08:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 3078.604077] kauditd_printk_skb: 266 callbacks suppressed [ 3078.604090] audit: type=1400 audit(1563293299.714:110670): avc: denied { map } for pid=16405 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:19 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffffffa0030000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3078.848010] audit: type=1400 audit(1563293299.714:110671): avc: denied { map } for pid=16405 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3079.012331] audit: type=1400 audit(1563293299.714:110672): avc: denied { map } for pid=16405 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8100000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3079.242032] audit: type=1400 audit(1563293299.804:110673): avc: denied { map } for pid=16405 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3079.399995] audit: type=1400 audit(1563293299.804:110674): avc: denied { map } for pid=16405 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7", 0x46}], 0x1) [ 3079.622089] audit: type=1400 audit(1563293299.814:110675): avc: denied { map } for pid=16409 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3079.775988] audit: type=1400 audit(1563293299.814:110676): avc: denied { map } for pid=16409 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:20 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xfffffffffffff000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3079.932296] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3079.946040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3079.951066] audit: type=1400 audit(1563293299.814:110677): avc: denied { map } for pid=16409 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x86ddffff00000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 16:08:21 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x280ffff00000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7", 0x46}], 0x1) 16:08:22 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8847000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:22 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5", 0x47}], 0x1) 16:08:23 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) 16:08:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8848000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5", 0x47}], 0x1) 16:08:23 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x480ffff00000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:23 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8864000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) 16:08:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5", 0x47}], 0x1) 16:08:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:24 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:25 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88a8ffff00000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3084.033913] kauditd_printk_skb: 278 callbacks suppressed [ 3084.033928] audit: type=1400 audit(1563293305.144:110934): avc: denied { map } for pid=16513 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3084.197991] audit: type=1400 audit(1563293305.144:110935): avc: denied { map } for pid=16514 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3084.362148] audit: type=1400 audit(1563293305.144:110936): avc: denied { map } for pid=16514 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f00000001c0)) [ 3084.582751] audit: type=1400 audit(1563293305.184:110937): avc: denied { map } for pid=16513 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:25 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3084.711972] audit: type=1400 audit(1563293305.194:110938): avc: denied { map } for pid=16513 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3084.968289] audit: type=1400 audit(1563293305.194:110939): avc: denied { map } for pid=16513 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:08:26 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x88caffff00000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3085.161978] audit: type=1400 audit(1563293305.214:110940): avc: denied { map } for pid=16514 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3085.308614] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3085.322922] audit: type=1400 audit(1563293305.214:110941): avc: denied { map } for pid=16514 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3085.351220] audit: audit_lost=1780 audit_rate_limit=0 audit_backlog_limit=64 16:08:26 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sched_setattr(0x0, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa198) 16:08:26 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8906000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:27 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:08:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x8dffffff00000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:28 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:28 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) 16:08:29 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf5ffffff00000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:29 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:08:29 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:29 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xff00000000000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) 16:08:30 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3089.049933] kauditd_printk_skb: 272 callbacks suppressed [ 3089.049949] audit: type=1400 audit(1563293310.154:111189): avc: denied { map } for pid=16698 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3089.195470] audit: type=1400 audit(1563293310.194:111190): avc: denied { map } for pid=16703 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:30 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 3089.373779] audit: type=1400 audit(1563293310.234:111191): avc: denied { map } for pid=16698 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3089.557994] audit: type=1400 audit(1563293310.254:111192): avc: denied { map } for pid=16703 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2200000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3089.692404] audit: type=1400 audit(1563293310.264:111193): avc: denied { map } for pid=16703 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3089.838354] audit: type=1400 audit(1563293310.264:111194): avc: denied { map } for pid=16703 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffffffa0008000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x01\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:08:31 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) [ 3090.002489] audit: type=1400 audit(1563293310.284:111195): avc: denied { map } for pid=16698 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3090.222065] audit: type=1400 audit(1563293310.294:111196): avc: denied { map } for pid=16698 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3090.436007] audit: type=1400 audit(1563293310.364:111197): avc: denied { map } for pid=16703 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 3090.612343] audit: type=1400 audit(1563293310.404:111198): avc: denied { map } for pid=16703 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2c00000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffffffa0010000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:32 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) 16:08:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xa0\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x1e) 16:08:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffffffa0018000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:33 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:08:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffffffa0030000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:08:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 16:08:34 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xfffffffffffff000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4603000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3094.055800] kauditd_printk_skb: 238 callbacks suppressed [ 3094.055815] audit: type=1400 audit(1563293315.164:111431): avc: denied { map } for pid=16791 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) [ 3094.257912] audit: type=1400 audit(1563293315.174:111432): avc: denied { map } for pid=16791 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:35 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x543, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3094.448800] audit: type=1400 audit(1563293315.194:111433): avc: denied { map } for pid=16786 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) [ 3094.671972] audit: type=1400 audit(1563293315.204:111434): avc: denied { map } for pid=16786 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 3094.885364] audit: type=1400 audit(1563293315.204:111435): avc: denied { map } for pid=16790 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3095.090241] audit: type=1400 audit(1563293315.234:111436): avc: denied { map } for pid=16791 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3095.282338] audit: type=1400 audit(1563293315.254:111437): avc: denied { map } for pid=16786 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:36 executing program 1: ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 16:08:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4703000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3095.442000] audit: type=1400 audit(1563293315.274:111439): avc: denied { map } for pid=16791 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:36 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3095.570368] audit: type=1400 audit(1563293315.274:111440): avc: denied { map } for pid=16791 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3095.644135] audit: audit_backlog=65 > audit_backlog_limit=64 16:08:37 executing program 1: ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 16:08:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) 16:08:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8004000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:37 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x608, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:38 executing program 1: ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 16:08:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:08:38 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x689, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 16:08:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xe101000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 16:08:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:39 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 3099.064207] kauditd_printk_skb: 269 callbacks suppressed [ 3099.064223] audit: type=1400 audit(1563293320.174:111674): avc: denied { map } for pid=16877 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xe400000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) [ 3099.314671] audit: type=1400 audit(1563293320.194:111675): avc: denied { map } for pid=16880 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3099.487431] audit: type=1400 audit(1563293320.204:111676): avc: denied { map } for pid=16880 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3099.695304] audit: type=1400 audit(1563293320.214:111677): avc: denied { map } for pid=16877 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 16:08:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3099.822923] audit: type=1400 audit(1563293320.254:111678): avc: denied { map } for pid=16893 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:41 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3099.972587] audit: type=1400 audit(1563293320.264:111679): avc: denied { map } for pid=16893 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3100.102024] audit: type=1400 audit(1563293320.334:111680): avc: denied { map } for pid=16893 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3100.240018] audit: type=1400 audit(1563293320.334:111681): avc: denied { map } for pid=16892 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3100.397838] audit: type=1400 audit(1563293320.334:111682): avc: denied { map } for pid=16893 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3100.561274] audit: type=1400 audit(1563293320.334:111683): avc: denied { map } for pid=16892 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:41 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 16:08:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 16:08:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:42 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf900000000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:42 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 16:08:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:43 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x01\x00'}, &(0x7f0000000080)=0x1e) 16:08:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffff1f0000000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:43 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 16:08:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$unix(0x1, 0x3, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:44 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\xcd\x94\xa4\x84\x00\b\x00\x00\x00\x00\x00\x00]\v\xbf\x9a\xcb') openat$cgroup_ro(r0, &(0x7f0000000440)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) 16:08:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$unix(0x1, 0x3, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) [ 3104.093162] kauditd_printk_skb: 245 callbacks suppressed [ 3104.093175] audit: type=1400 audit(1563293325.204:111920): avc: denied { map } for pid=16980 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:45 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x2800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3104.294899] audit: type=1400 audit(1563293325.244:111921): avc: denied { map } for pid=16980 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3104.501965] audit: type=1400 audit(1563293325.244:111922): avc: denied { map } for pid=16980 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3104.633712] audit: type=1400 audit(1563293325.314:111924): avc: denied { map } for pid=16980 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffa0008000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3104.869058] audit: type=1400 audit(1563293325.314:111925): avc: denied { map } for pid=16980 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$unix(0x1, 0x3, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 16:08:46 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x86ddffff00000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3105.059066] audit: type=1400 audit(1563293325.304:111923): avc: denied { map } for pid=16982 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:46 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3580, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3105.211616] audit: type=1400 audit(1563293325.384:111926): avc: denied { map } for pid=16982 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3105.400006] audit: type=1400 audit(1563293325.384:111927): avc: denied { map } for pid=16982 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\x03\x00'}, &(0x7f0000000080)=0x1e) [ 3105.586947] audit: type=1400 audit(1563293325.384:111928): avc: denied { map } for pid=16982 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3105.708107] audit: audit_backlog=65 > audit_backlog_limit=64 16:08:46 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xffffdd86, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffa0010000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, 0x0, 0x0) 16:08:47 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffa0018000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:47 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x86ddffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, 0x0, 0x0) 16:08:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00G\x03\x00'}, &(0x7f0000000080)=0x1e) 16:08:48 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x543, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffa0030000, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, 0x0, 0x0) 16:08:49 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x03\x00'}, &(0x7f0000000080)=0x1e) 16:08:50 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3109.108023] kauditd_printk_skb: 245 callbacks suppressed [ 3109.108039] audit: type=1400 audit(1563293330.214:112157): avc: denied { map } for pid=17068 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3109.311434] audit: type=1400 audit(1563293330.214:112158): avc: denied { map } for pid=17070 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 16:08:50 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3109.462782] audit: type=1400 audit(1563293330.224:112159): avc: denied { map } for pid=17071 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3109.652708] audit: type=1400 audit(1563293330.224:112160): avc: denied { map } for pid=17071 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3109.797934] audit: type=1400 audit(1563293330.264:112161): avc: denied { map } for pid=17072 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x608, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3109.997190] audit: type=1400 audit(1563293330.284:112162): avc: denied { map } for pid=17070 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='\"arrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3110.179417] audit: type=1400 audit(1563293330.284:112163): avc: denied { map } for pid=17070 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:51 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x4788, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) [ 3110.359880] audit: type=1400 audit(1563293330.324:112164): avc: denied { map } for pid=17071 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:51 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) [ 3110.581578] audit: type=1400 audit(1563293330.354:112165): avc: denied { map } for pid=17072 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3110.667646] audit: audit_backlog=65 > audit_backlog_limit=64 16:08:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x689, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3111.126787] gfs2: invalid mount option: "arrier [ 3111.189124] gfs2: can't parse mount arguments [ 3111.318084] gfs2: invalid mount option: "arrier 16:08:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) [ 3111.363895] gfs2: can't parse mount arguments 16:08:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier=',arrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:52 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x4888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:52 executing program 1: syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) 16:08:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:53 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3112.609992] gfs2: invalid mount option: arrier [ 3112.639620] gfs2: can't parse mount arguments 16:08:53 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3112.796830] gfs2: invalid mount option: arrier [ 3112.862084] gfs2: can't parse mount arguments 16:08:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='b\"rrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:54 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:54 executing program 1: syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:54 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x6488, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 3114.001066] gfs2: invalid mount option: b"rrier [ 3114.062039] gfs2: can't parse mount arguments [ 3114.158710] gfs2: invalid mount option: b"rrier [ 3114.170418] kauditd_printk_skb: 296 callbacks suppressed [ 3114.170432] audit: type=1400 audit(1563293335.274:112421): avc: denied { map } for pid=17158 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.228475] gfs2: can't parse mount arguments 16:08:55 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x2000000, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3114.356637] audit: type=1400 audit(1563293335.324:112422): avc: denied { map } for pid=17158 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='b,rrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:55 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x800e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3114.572036] audit: type=1400 audit(1563293335.324:112423): avc: denied { map } for pid=17158 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3114.738476] audit: type=1400 audit(1563293335.384:112424): avc: denied { map } for pid=17161 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.908748] audit: type=1400 audit(1563293335.384:112425): avc: denied { map } for pid=17161 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3115.053388] audit: type=1400 audit(1563293335.394:112426): avc: denied { map } for pid=17158 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:56 executing program 1: syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3115.312051] audit: type=1400 audit(1563293335.394:112427): avc: denied { map } for pid=17158 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3115.378689] gfs2: invalid mount option: b [ 3115.401338] gfs2: can't parse mount arguments 16:08:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) [ 3115.452612] audit: type=1400 audit(1563293335.414:112428): avc: denied { map } for pid=17162 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:56 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8035, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3115.536808] gfs2: invalid mount option: b [ 3115.561575] gfs2: can't parse mount arguments [ 3115.581696] audit: type=1400 audit(1563293335.414:112429): avc: denied { map } for pid=17162 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:08:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3115.636169] audit: audit_backlog=65 > audit_backlog_limit=64 16:08:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) 16:08:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='ba\"rier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:57 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3116.575299] gfs2: invalid mount option: ba"rier [ 3116.619231] gfs2: can't parse mount arguments 16:08:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='ba,rier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x8004, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:58 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) 16:08:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 16:08:58 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8847, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x2800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:59 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x8004, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3118.017710] gfs2: invalid mount option: ba [ 3118.052274] gfs2: can't parse mount arguments [ 3118.233718] gfs2: invalid mount option: ba 16:08:59 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8848, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3118.254519] gfs2: can't parse mount arguments 16:08:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='bar\"ier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:08:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) 16:08:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3580, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:08:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) 16:09:00 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x8004, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:00 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8864, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3119.173090] kauditd_printk_skb: 269 callbacks suppressed [ 3119.173104] audit: type=1400 audit(1563293340.284:112682): avc: denied { map } for pid=17250 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3119.289664] gfs2: invalid mount option: bar"ier [ 3119.353335] audit: type=1400 audit(1563293340.284:112683): avc: denied { map } for pid=17250 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3119.373393] gfs2: can't parse mount arguments [ 3119.523791] gfs2: invalid mount option: bar"ier [ 3119.538047] audit: type=1400 audit(1563293340.304:112684): avc: denied { map } for pid=17250 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3119.575022] gfs2: can't parse mount arguments 16:09:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='bar,ier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:00 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3119.805744] audit: type=1400 audit(1563293340.314:112685): avc: denied { map } for pid=17250 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3120.053467] audit: type=1400 audit(1563293340.384:112686): avc: denied { map } for pid=17250 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3120.067129] audit: audit_backlog=65 > audit_backlog_limit=64 16:09:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) [ 3120.111948] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3120.123791] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3120.155450] audit: audit_lost=1832 audit_rate_limit=0 audit_backlog_limit=64 [ 3120.167840] audit: audit_lost=1833 audit_rate_limit=0 audit_backlog_limit=64 16:09:01 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8906, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:01 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf0ffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3120.752888] gfs2: not a GFS2 filesystem [ 3120.794545] gfs2: invalid mount option: bar [ 3120.808616] gfs2: can't parse mount arguments 16:09:02 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3120.947426] gfs2: invalid mount option: bar [ 3120.951812] gfs2: can't parse mount arguments 16:09:02 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xf000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barr\"er'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:09:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:02 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf0ffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3122.021423] gfs2: not a GFS2 filesystem 16:09:03 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3122.333303] gfs2: invalid mount option: barr"er [ 3122.357222] gfs2: can't parse mount arguments [ 3122.486125] gfs2: invalid mount option: barr"er [ 3122.517623] gfs2: can't parse mount arguments 16:09:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:03 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barr,er'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:03 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0xf0ffff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3123.015378] gfs2: not a GFS2 filesystem 16:09:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x00\x80\x00'}, &(0x7f0000000080)=0x1e) 16:09:04 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8000a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, 0x0) 16:09:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x4788, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3123.582339] gfs2: invalid mount option: barr 16:09:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x2) [ 3123.652132] gfs2: can't parse mount arguments [ 3123.844434] gfs2: invalid mount option: barr [ 3123.862021] gfs2: can't parse mount arguments 16:09:05 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barri\"r'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:05 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8001a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3124.192470] kauditd_printk_skb: 279 callbacks suppressed [ 3124.192486] audit: type=1400 audit(1563293345.304:112962): avc: denied { map } for pid=17337 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3124.414658] audit: type=1400 audit(1563293345.304:112963): avc: denied { map } for pid=17342 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x4888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3124.649938] audit: type=1400 audit(1563293345.364:112964): avc: denied { map } for pid=17342 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\x01\x80\x00'}, &(0x7f0000000080)=0x1e) [ 3124.851305] audit: type=1400 audit(1563293345.404:112965): avc: denied { map } for pid=17338 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/packet\x00') [ 3125.030934] gfs2: invalid mount option: barri"r [ 3125.042001] audit: type=1400 audit(1563293345.404:112966): avc: denied { map } for pid=17338 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.064887] gfs2: can't parse mount arguments 16:09:06 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xf0ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3125.242262] gfs2: invalid mount option: barri"r [ 3125.245927] audit: type=1400 audit(1563293345.414:112967): avc: denied { map } for pid=17342 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.252062] gfs2: can't parse mount arguments 16:09:06 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) [ 3125.411071] audit: type=1400 audit(1563293345.424:112968): avc: denied { map } for pid=17342 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:06 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barri,r'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3125.618225] audit: type=1400 audit(1563293345.444:112969): avc: denied { map } for pid=17346 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.812507] audit: type=1400 audit(1563293345.464:112970): avc: denied { map } for pid=17346 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3125.945168] audit: type=1400 audit(1563293345.474:112971): avc: denied { map } for pid=17342 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:07 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) 16:09:07 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3126.459022] gfs2: invalid mount option: barri [ 3126.505356] gfs2: can't parse mount arguments 16:09:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f0000000080)=0x1e) 16:09:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'lo\x00'}) [ 3126.664896] gfs2: invalid mount option: barri [ 3126.741937] gfs2: can't parse mount arguments 16:09:08 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrie\"'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x6488, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setresuid(0x0, r1, 0x0) 16:09:08 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3127.632142] gfs2: invalid mount option: barrie" [ 3127.667412] gfs2: can't parse mount arguments 16:09:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'lo\x00'}) 16:09:09 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrie,'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x800e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:09:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setresuid(0x0, r1, 0x0) 16:09:09 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'lo\x00'}) [ 3128.967225] gfs2: invalid mount option: barrie [ 3129.061184] gfs2: can't parse mount arguments 16:09:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8035, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3129.217728] kauditd_printk_skb: 271 callbacks suppressed [ 3129.217743] audit: type=1400 audit(1563293350.324:113198): avc: denied { map } for pid=17424 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3129.277106] gfs2: invalid mount option: barrie [ 3129.281750] gfs2: can't parse mount arguments 16:09:10 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setresuid(0x0, r1, 0x0) 16:09:10 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier', 0x22}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3129.432036] audit: type=1400 audit(1563293350.334:113199): avc: denied { map } for pid=17424 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3129.633688] audit: type=1400 audit(1563293350.364:113200): avc: denied { map } for pid=17423 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3129.827817] audit: type=1400 audit(1563293350.374:113201): avc: denied { getopt } for pid=17425 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 16:09:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) [ 3130.032127] audit: type=1400 audit(1563293350.384:113202): avc: denied { map } for pid=17423 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:11 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'lo\x00'}) [ 3130.198215] audit: type=1400 audit(1563293350.394:113203): avc: denied { map } for pid=17424 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:11 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3130.361864] audit: type=1400 audit(1563293350.404:113204): avc: denied { map } for pid=17424 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3130.389307] gfs2: invalid mount option: barrier"nosuiddir [ 3130.432517] gfs2: can't parse mount arguments [ 3130.510019] audit: type=1400 audit(1563293350.414:113205): avc: denied { map } for pid=17432 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3130.545640] audit: audit_backlog=65 > audit_backlog_limit=64 16:09:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setresuid(0x0, r1, 0x0) [ 3130.568319] audit: audit_lost=1850 audit_rate_limit=0 audit_backlog_limit=64 [ 3130.580211] gfs2: invalid mount option: barrier"nosuiddir [ 3130.598448] gfs2: can't parse mount arguments 16:09:11 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='\"osuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8847, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) 16:09:12 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x124) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:09:12 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:12 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) setresuid(0x0, 0x0, 0x0) [ 3131.833156] gfs2: invalid mount option: "osuiddir [ 3131.838081] gfs2: can't parse mount arguments [ 3131.985854] gfs2: invalid mount option: "osuiddir [ 3131.990762] gfs2: can't parse mount arguments 16:09:13 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir=',osuiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8848, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8060000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:13 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) setresuid(0x0, 0x0, 0x0) 16:09:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:09:14 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="0000000200000000faff070000ee8b08b7960ff7aa6e041c7700fdf0058058aa0063b8f24252b1d85cbf1d0000000038f70f653f0ffb09f0d536b564df5e0a9e0e1925bfff01000063e232b9b2500fb1d96033ccfdff0664cffcf15c937d1aa6d1d7e44b1a5aca5d6b9917694df4616dc0e90ee3ccd44758f0c6e5591505091f60c360c09df5658b3079e4765fc04301a86f2cfed0bbf9d52fc19dd06bee71535dc608d068156d991f79125e1994cc686e0539e1c6519c6c0de67b21ec0d6f1aca8b756e4deadf01d044fc91933653539af7fef0bfd909d97912c5ae513d9fb72cdfbb420948a73104401a142b0112ba043e7d89cec46daaeb9b20bde1fccfc67998f25ad1edc3bbf42357425e49f62b252748d4e46c33b807b120a681f62e5d13cdef32"], 0x124) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 3133.351317] gfs2: invalid mount option: osuiddir [ 3133.387274] gfs2: can't parse mount arguments [ 3133.535297] gfs2: invalid mount option: osuiddir [ 3133.582080] gfs2: can't parse mount arguments 16:09:14 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xd000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8864, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:14 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) setresuid(0x0, 0x0, 0x0) 16:09:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='n\"suiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3134.244280] kauditd_printk_skb: 269 callbacks suppressed [ 3134.244295] audit: type=1400 audit(1563293355.344:113468): avc: denied { map } for pid=17518 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3134.423726] audit: type=1400 audit(1563293355.384:113469): avc: denied { map } for pid=17518 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) 16:09:15 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3134.560692] audit: type=1400 audit(1563293355.414:113470): avc: denied { map } for pid=17518 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8906, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:15 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x124) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:09:15 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setresuid(0x0, r0, 0x0) [ 3134.742653] audit: type=1400 audit(1563293355.414:113471): avc: denied { map } for pid=17518 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3134.853335] audit: type=1400 audit(1563293355.424:113472): avc: denied { map } for pid=17521 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3134.903568] gfs2: invalid mount option: n"suiddir [ 3134.908480] gfs2: can't parse mount arguments [ 3135.022081] audit: type=1400 audit(1563293355.454:113473): avc: denied { map } for pid=17521 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3135.128504] gfs2: invalid mount option: n"suiddir [ 3135.133531] audit: type=1400 audit(1563293355.474:113474): avc: denied { map } for pid=17521 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3135.197452] gfs2: can't parse mount arguments 16:09:16 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='n,suiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3135.332004] audit: type=1400 audit(1563293355.484:113476): avc: denied { map } for pid=17518 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3135.463852] audit: type=1400 audit(1563293355.474:113475): avc: denied { map } for pid=17521 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:16 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setresuid(0x0, r0, 0x0) 16:09:16 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x28000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xf000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3135.672198] audit: type=1400 audit(1563293355.564:113477): avc: denied { map } for pid=17518 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) [ 3136.463068] gfs2: invalid mount option: n [ 3136.502086] gfs2: can't parse mount arguments 16:09:17 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x124) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:09:17 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:17 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setresuid(0x0, r0, 0x0) [ 3136.683708] gfs2: invalid mount option: n 16:09:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3136.742093] gfs2: can't parse mount arguments 16:09:17 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='no\"uiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:18 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setresuid(0x0, r0, 0x0) 16:09:18 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8000a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 3138.004789] gfs2: invalid mount option: no"uiddir [ 3138.048059] gfs2: can't parse mount arguments [ 3138.214709] gfs2: invalid mount option: no"uiddir [ 3138.262781] gfs2: can't parse mount arguments 16:09:19 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='no,uiddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:19 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setresuid(0x0, r0, 0x0) 16:09:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) fstat(r3, &(0x7f00000003c0)) rename(&(0x7f0000000040)='./file0\x00', 0x0) 16:09:19 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8001a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:20 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setresuid(0x0, r0, 0x0) [ 3139.275008] kauditd_printk_skb: 264 callbacks suppressed [ 3139.275023] audit: type=1400 audit(1563293360.384:113715): avc: denied { map } for pid=17599 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3139.363773] gfs2: invalid mount option: no [ 3139.388222] gfs2: can't parse mount arguments [ 3139.476980] audit: type=1400 audit(1563293360.424:113716): avc: denied { map } for pid=17599 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3139.544120] gfs2: invalid mount option: no [ 3139.552988] gfs2: can't parse mount arguments 16:09:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nos\"iddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3139.636188] audit: type=1400 audit(1563293360.474:113717): avc: denied { map } for pid=17604 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 16:09:20 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x43050000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3139.811434] audit: type=1400 audit(1563293360.484:113718): avc: denied { map } for pid=17604 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xf0ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3139.941185] audit: type=1400 audit(1563293360.484:113719): avc: denied { map } for pid=17599 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3140.123200] audit: type=1400 audit(1563293360.504:113720): avc: denied { map } for pid=17599 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3140.296733] audit: type=1400 audit(1563293360.514:113721): avc: denied { map } for pid=17604 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000000c0)) setresuid(0x0, 0x0, 0x0) [ 3140.481427] audit: type=1400 audit(1563293360.524:113722): avc: denied { map } for pid=17604 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3140.623483] audit: type=1400 audit(1563293360.574:113723): avc: denied { map } for pid=17606 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3140.682117] gfs2: invalid mount option: nos"iddir [ 3140.711439] gfs2: can't parse mount arguments [ 3140.760342] audit: type=1400 audit(1563293360.584:113724): avc: denied { map } for pid=17606 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3140.886881] gfs2: invalid mount option: nos"iddir [ 3140.927056] gfs2: can't parse mount arguments 16:09:22 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) fstat(r3, &(0x7f00000003c0)) rename(&(0x7f0000000040)='./file0\x00', 0x0) 16:09:22 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nos,iddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) 16:09:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000000c0)) setresuid(0x0, 0x0, 0x0) 16:09:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:23 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x800e0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3142.036701] gfs2: invalid mount option: nos [ 3142.041123] gfs2: can't parse mount arguments [ 3142.233963] gfs2: invalid mount option: nos [ 3142.272247] gfs2: can't parse mount arguments 16:09:23 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosu\"ddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) 16:09:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000000c0)) setresuid(0x0, 0x0, 0x0) 16:09:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) fstat(r3, &(0x7f00000003c0)) rename(&(0x7f0000000040)='./file0\x00', 0x0) 16:09:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:24 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x80350000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3143.438822] gfs2: invalid mount option: nosu"ddir [ 3143.492018] gfs2: can't parse mount arguments [ 3143.642989] gfs2: invalid mount option: nosu"ddir [ 3143.683765] gfs2: can't parse mount arguments 16:09:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosu,ddir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) 16:09:25 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x81000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\xa0\x00'}, &(0x7f0000000080)=0x1e) [ 3144.293854] kauditd_printk_skb: 287 callbacks suppressed [ 3144.293872] audit: type=1400 audit(1563293365.404:113970): avc: denied { map } for pid=17686 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3144.524250] audit: type=1400 audit(1563293365.454:113971): avc: denied { map } for pid=17691 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3144.638985] audit: type=1400 audit(1563293365.454:113972): avc: denied { map } for pid=17691 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3144.793115] audit: type=1400 audit(1563293365.474:113973): avc: denied { map } for pid=17691 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3144.962042] gfs2: invalid mount option: nosu [ 3144.979573] audit: type=1400 audit(1563293365.474:113974): avc: denied { map } for pid=17691 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3144.997628] gfs2: can't parse mount arguments 16:09:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) 16:09:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) fstat(r3, &(0x7f00000003c0)) rename(&(0x7f0000000040)='./file0\x00', 0x0) [ 3145.161847] audit: type=1400 audit(1563293365.484:113975): avc: denied { map } for pid=17686 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3145.190476] gfs2: invalid mount option: nosu [ 3145.225615] gfs2: can't parse mount arguments 16:09:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3145.362506] audit: type=1400 audit(1563293365.484:113976): avc: denied { map } for pid=17686 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosui\"dir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:26 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x86ddffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3145.611995] audit: type=1400 audit(1563293365.544:113977): avc: denied { map } for pid=17691 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3145.628141] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3145.660081] audit: audit_backlog=65 > audit_backlog_limit=64 16:09:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xa0\x00'}, &(0x7f0000000080)=0x1e) 16:09:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) 16:09:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3146.552035] gfs2: invalid mount option: nosui"dir [ 3146.572671] gfs2: can't parse mount arguments 16:09:27 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x88470000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3146.734895] gfs2: invalid mount option: nosui"dir [ 3146.739816] gfs2: can't parse mount arguments 16:09:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosui,dir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) setresuid(0x0, 0x0, 0x0) 16:09:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8060000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) fstat(r3, &(0x7f00000003c0)) rename(&(0x7f0000000040)='./file0\x00', 0x0) 16:09:28 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x88480000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x01\xa0\x00'}, &(0x7f0000000080)=0x1e) [ 3147.702237] gfs2: invalid mount option: nosui [ 3147.722049] gfs2: can't parse mount arguments 16:09:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosui.dir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) setresuid(0x0, 0x0, 0x0) 16:09:29 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x88640000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:29 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xd000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3148.703744] gfs2: invalid mount option: nosui.dir [ 3148.766154] gfs2: can't parse mount arguments 16:09:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) setresuid(0x0, 0x0, 0x0) 16:09:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosui/dir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\xa0\x00'}, &(0x7f0000000080)=0x1e) [ 3149.324920] kauditd_printk_skb: 265 callbacks suppressed [ 3149.324935] audit: type=1400 audit(1563293370.434:114233): avc: denied { map } for pid=17770 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:30 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x88a8ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3149.544479] audit: type=1400 audit(1563293370.434:114234): avc: denied { map } for pid=17770 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) fstat(r3, &(0x7f00000003c0)) 16:09:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3149.727484] audit: type=1400 audit(1563293370.474:114235): avc: denied { map } for pid=17769 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3149.872081] audit: type=1400 audit(1563293370.474:114236): avc: denied { map } for pid=17769 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3150.048418] gfs2: invalid mount option: nosui/dir [ 3150.089368] audit: type=1400 audit(1563293370.484:114237): avc: denied { map } for pid=17771 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3150.118081] gfs2: can't parse mount arguments 16:09:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) fstat(r3, &(0x7f00000003c0)) rename(&(0x7f0000000040)='./file0\x00', 0x0) [ 3150.286723] gfs2: invalid mount option: nosui/dir [ 3150.302955] audit: type=1400 audit(1563293370.484:114238): avc: denied { map } for pid=17771 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3150.351174] gfs2: can't parse mount arguments 16:09:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuid\"ir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3150.481956] audit: type=1400 audit(1563293370.484:114239): avc: denied { map } for pid=17771 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:31 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x88caffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x28000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3150.638327] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3150.662960] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3150.668818] audit: audit_lost=1880 audit_rate_limit=0 audit_backlog_limit=64 16:09:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x01\x00'}, &(0x7f0000000080)=0x1e) [ 3151.518042] gfs2: invalid mount option: nosuid"ir 16:09:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3151.542789] gfs2: can't parse mount arguments 16:09:32 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x89060000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) [ 3151.683207] gfs2: invalid mount option: nosuid"ir [ 3151.719446] gfs2: can't parse mount arguments 16:09:32 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuid,ir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x03\x00'}, &(0x7f0000000080)=0x1e) 16:09:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) fstat(r3, &(0x7f00000003c0)) rename(&(0x7f0000000040)='./file0\x00', 0x0) 16:09:33 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8dffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3152.926042] gfs2: invalid mount option: nosuid [ 3152.981240] gfs2: can't parse mount arguments 16:09:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuid.ir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) 16:09:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000340)='./file0\x00', 0x0) 16:09:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:34 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3154.030950] gfs2: invalid mount option: nosuid.ir [ 3154.064275] gfs2: can't parse mount arguments [ 3154.214231] gfs2: invalid mount option: nosuid.ir 16:09:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x43050000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3154.238531] gfs2: can't parse mount arguments 16:09:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuid/ir'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3154.359411] kauditd_printk_skb: 238 callbacks suppressed [ 3154.359430] audit: type=1400 audit(1563293375.464:114475): avc: denied { map } for pid=17854 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) fstat(r3, &(0x7f00000003c0)) rename(&(0x7f0000000040)='./file0\x00', 0x0) 16:09:35 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xa0010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3154.581774] audit: type=1400 audit(1563293375.484:114476): avc: denied { map } for pid=17849 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 3154.772074] audit: type=1400 audit(1563293375.504:114477): avc: denied { map } for pid=17849 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x00\x80\x00'}, &(0x7f0000000080)=0x1e) [ 3154.933102] audit: type=1400 audit(1563293375.504:114478): avc: denied { map } for pid=17855 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3155.081999] audit: type=1400 audit(1563293375.514:114479): avc: denied { map } for pid=17854 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3155.206237] audit: type=1400 audit(1563293375.544:114480): avc: denied { map } for pid=17849 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3155.347232] gfs2: invalid mount option: nosuid/ir [ 3155.384558] gfs2: can't parse mount arguments [ 3155.389233] audit: type=1400 audit(1563293375.544:114481): avc: denied { map } for pid=17855 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3155.514730] gfs2: invalid mount option: nosuid/ir [ 3155.552047] audit: type=1400 audit(1563293375.564:114482): avc: denied { map } for pid=17854 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3155.585012] gfs2: can't parse mount arguments 16:09:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r1 = shmat(r0, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r1) 16:09:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuidd\"r'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3155.706624] audit: type=1400 audit(1563293375.584:114483): avc: denied { map } for pid=17854 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:36 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xa0018000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3155.912378] audit: type=1400 audit(1563293375.584:114484): avc: denied { map } for pid=17849 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x800e0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) fstat(r3, &(0x7f00000003c0)) 16:09:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x01\x80\x00'}, &(0x7f0000000080)=0x1e) 16:09:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r1 = shmat(r0, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) shmdt(r1) [ 3156.846723] gfs2: invalid mount option: nosuidd"r [ 3156.885204] gfs2: can't parse mount arguments 16:09:38 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xa0030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3157.065373] gfs2: invalid mount option: nosuidd"r [ 3157.101979] gfs2: can't parse mount arguments 16:09:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuidd,r'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x80350000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r1 = shmat(r0, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmdt(r1) 16:09:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f0000000080)=0x1e) 16:09:39 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3158.278112] gfs2: invalid mount option: nosuidd [ 3158.342845] gfs2: can't parse mount arguments 16:09:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) fstat(r3, &(0x7f00000003c0)) [ 3158.472925] gfs2: invalid mount option: nosuidd 16:09:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x81000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3158.509885] gfs2: can't parse mount arguments 16:09:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddi\"'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) shmdt(0x0) 16:09:40 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x86ddffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3159.362569] kauditd_printk_skb: 241 callbacks suppressed [ 3159.362582] audit: type=1400 audit(1563293380.474:114726): avc: denied { map } for pid=17935 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3159.544994] gfs2: invalid mount option: nosuiddi" [ 3159.554088] audit: type=1400 audit(1563293380.474:114727): avc: denied { map } for pid=17935 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3159.603379] gfs2: can't parse mount arguments 16:09:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) [ 3159.727541] audit: type=1400 audit(1563293380.514:114729): avc: denied { map } for pid=17932 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) shmdt(0x0) 16:09:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000080)=0x1e) [ 3159.902472] audit: type=1400 audit(1563293380.474:114728): avc: denied { map } for pid=17935 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddi,'}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3160.121992] audit: type=1400 audit(1563293380.524:114730): avc: denied { map } for pid=17932 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:41 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xffffa888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3160.360347] audit: type=1400 audit(1563293380.544:114731): avc: denied { map } for pid=17928 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x88470000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3160.572038] audit: type=1400 audit(1563293380.544:114732): avc: denied { map } for pid=17928 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3160.718604] audit: type=1400 audit(1563293380.564:114733): avc: denied { map } for pid=17932 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3160.895162] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3160.901032] audit: audit_lost=1882 audit_rate_limit=0 audit_backlog_limit=64 16:09:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) shmdt(0x0) [ 3161.008502] gfs2: invalid mount option: nosuiddi [ 3161.058467] gfs2: can't parse mount arguments 16:09:42 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xffffca88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3161.243460] gfs2: invalid mount option: nosuiddi [ 3161.273738] gfs2: can't parse mount arguments 16:09:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x88480000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir', 0x22}, {@statfs_percent={'statfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000080)=0x1e) 16:09:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000340)='./file0\x00', 0x0) 16:09:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r0 = shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmdt(r0) 16:09:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x88640000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:43 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xffffdd86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3162.489874] gfs2: invalid mount option: nosuiddir"statfs_percent=0x0000000000000000 [ 3162.556252] gfs2: can't parse mount arguments [ 3162.719563] gfs2: invalid mount option: nosuiddir"statfs_percent=0x0000000000000000 16:09:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 3162.797189] gfs2: can't parse mount arguments 16:09:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'\"tatfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000080)=0x1e) 16:09:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmdt(r0) 16:09:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x88a8ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:44 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xfffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r1 = shmat(r0, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) shmdt(r1) [ 3163.898534] gfs2: invalid mount option: "tatfs_percent=0x0000000000000000 [ 3163.982064] gfs2: can't parse mount arguments 16:09:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmdt(r0) 16:09:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={',tatfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x88caffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:45 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xffffff8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3164.378559] kauditd_printk_skb: 244 callbacks suppressed [ 3164.378572] audit: type=1400 audit(1563293385.484:114977): avc: denied { map } for pid=18019 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3164.603386] audit: type=1400 audit(1563293385.534:114978): avc: denied { map } for pid=18019 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3164.793678] audit: type=1400 audit(1563293385.554:114979): avc: denied { map } for pid=18017 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, &(0x7f0000000080)=0x1e) 16:09:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) shmat(r0, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) [ 3165.016013] audit: type=1400 audit(1563293385.554:114980): avc: denied { map } for pid=18019 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3165.142946] gfs2: invalid mount option: tatfs_percent=0x0000000000000000 16:09:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmdt(r0) [ 3165.217176] gfs2: can't parse mount arguments [ 3165.239605] audit: type=1400 audit(1563293385.564:114981): avc: denied { map } for pid=18017 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3165.404431] gfs2: invalid mount option: tatfs_percent=0x0000000000000000 [ 3165.411333] gfs2: can't parse mount arguments 16:09:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x89060000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3165.468161] audit: type=1400 audit(1563293385.584:114982): avc: denied { map } for pid=18019 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:46 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xfffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'s\"atfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3165.630943] audit: type=1400 audit(1563293385.624:114983): avc: denied { map } for pid=18017 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3165.710160] audit: audit_backlog=65 > audit_backlog_limit=64 16:09:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) shmat(r0, &(0x7f0000ff6000/0x2000)=nil, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 3165.781719] audit: audit_lost=1883 audit_rate_limit=0 audit_backlog_limit=64 [ 3165.805081] audit: backlog limit exceeded 16:09:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8dffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:47 executing program 4: munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r0 = shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmdt(r0) 16:09:47 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x1a0ffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, &(0x7f0000000080)=0x1e) [ 3166.568704] gfs2: invalid mount option: s"atfs_percent=0x0000000000000000 [ 3166.622976] gfs2: can't parse mount arguments 16:09:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) shmat(r0, &(0x7f0000ff6000/0x2000)=nil, 0x0) 16:09:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'s,atfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:48 executing program 4: munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmdt(0x0) 16:09:48 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3a0ffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3167.488517] gfs2: invalid mount option: s 16:09:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) [ 3167.531992] gfs2: can't parse mount arguments 16:09:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'st\"tfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, &(0x7f0000000080)=0x1e) 16:09:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xa0010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:49 executing program 4: munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmdt(0x0) 16:09:49 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8000a0ffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) [ 3168.553285] gfs2: invalid mount option: st"tfs_percent=0x0000000000000000 [ 3168.560280] gfs2: can't parse mount arguments 16:09:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, &(0x7f0000000080)=0x1e) [ 3168.794161] gfs2: invalid mount option: st"tfs_percent=0x0000000000000000 [ 3168.827098] gfs2: can't parse mount arguments 16:09:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'st,tfs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xa0018000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:50 executing program 4: munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmdt(0x0) 16:09:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) 16:09:50 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8001a0ffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3169.386269] kauditd_printk_skb: 236 callbacks suppressed [ 3169.386284] audit: type=1400 audit(1563293390.494:115220): avc: denied { map } for pid=18107 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3169.567052] audit: type=1400 audit(1563293390.554:115221): avc: denied { map } for pid=18107 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3169.785772] audit: type=1400 audit(1563293390.604:115222): avc: denied { map } for pid=18107 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3169.833780] gfs2: invalid mount option: st [ 3169.853952] gfs2: can't parse mount arguments [ 3169.906880] audit: type=1400 audit(1563293390.604:115223): avc: denied { map } for pid=18107 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xa0030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:51 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xf0ffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3170.024628] gfs2: invalid mount option: st [ 3170.035941] audit: type=1400 audit(1563293390.744:115224): avc: denied { map } for pid=18116 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3170.069215] gfs2: can't parse mount arguments 16:09:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x400000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'eql\x00\x03\x00\x00\x00\x00\x00\x00\x00\xfc\x00', 0x7921}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000080)={'eql\x00i\x0e\xa9[\x00\xce\x00', @ifru_mtu=0x1}) 16:09:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'sta\"fs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) [ 3170.214855] audit: type=1400 audit(1563293390.744:115225): avc: denied { map } for pid=18116 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x1e) 16:09:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) [ 3170.341968] audit: type=1400 audit(1563293390.834:115226): avc: denied { map } for pid=18116 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3170.519403] audit: type=1400 audit(1563293390.834:115227): avc: denied { map } for pid=18116 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3170.749054] audit: type=1400 audit(1563293390.884:115228): avc: denied { map } for pid=18116 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3170.920085] audit: type=1400 audit(1563293390.894:115229): avc: denied { map } for pid=18116 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 16:09:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:52 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3171.263448] gfs2: invalid mount option: sta"fs_percent=0x0000000000000000 [ 3171.318019] gfs2: can't parse mount arguments 16:09:52 executing program 1: munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) shmat(0x0, &(0x7f0000ff6000/0x2000)=nil, 0x0) [ 3171.449768] gfs2: invalid mount option: sta"fs_percent=0x0000000000000000 [ 3171.508184] gfs2: can't parse mount arguments 16:09:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'sta,fs_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03F\x00'}, &(0x7f0000000080)=0x1e) 16:09:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = dup(r1) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @multicast2}, 0xc) 16:09:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:53 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) migrate_pages(0x0, 0x3, &(0x7f0000000040)=0x2, &(0x7f0000000080)=0x80000001) [ 3172.682827] gfs2: invalid mount option: sta [ 3172.718043] gfs2: can't parse mount arguments 16:09:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xffffa888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3172.858694] gfs2: invalid mount option: sta [ 3172.922795] gfs2: can't parse mount arguments 16:09:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@nosuiddir='nosuiddir'}, {@statfs_percent={'stat\"s_percent'}}, {@noloccookie='noloccookie'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 16:09:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000013d400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 16:09:54 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03G\x00'}, &(0x7f0000000080)=0x1e) 16:09:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) migrate_pages(0x0, 0x3, &(0x7f0000000040)=0x2, &(0x7f0000000080)=0x80000001) 16:09:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xffffca88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:09:55 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3174.028308] gfs2: invalid mount option: stat"s_percent=0x0000000000000000 [ 3174.052336] gfs2: can't parse mount arguments [ 3174.148315] gfs2: invalid mount option: stat"s_percent=0x0000000000000000 [ 3174.156658] ================================================================== [ 3174.164465] BUG: KASAN: use-after-free in bpf_prog_kallsyms_add+0x7c5/0x840 [ 3174.171586] Read of size 8 at addr ffff8880a55964e0 by task syz-executor.4/18204 [ 3174.179121] [ 3174.180758] CPU: 1 PID: 18204 Comm: syz-executor.4 Not tainted 4.19.59 #32 [ 3174.187774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3174.194564] gfs2: can't parse mount arguments [ 3174.197124] Call Trace: [ 3174.197185] dump_stack+0x172/0x1f0 [ 3174.197208] ? bpf_prog_kallsyms_add+0x7c5/0x840 [ 3174.207897] print_address_description.cold+0x7c/0x20d [ 3174.217912] ? bpf_prog_kallsyms_add+0x7c5/0x840 [ 3174.223123] kasan_report.cold+0x8c/0x2ba [ 3174.227285] __asan_report_load8_noabort+0x14/0x20 [ 3174.232226] bpf_prog_kallsyms_add+0x7c5/0x840 [ 3174.236886] bpf_prog_load+0xf7e/0x1400 [ 3174.240868] ? bpf_prog_new_fd+0x60/0x60 [ 3174.244969] ? selinux_bpf+0xe7/0x130 [ 3174.244990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3174.254310] ? security_bpf+0x8b/0xc0 [ 3174.258127] __x64_sys_bpf+0x32b/0x4c0 [ 3174.262030] ? bpf_prog_get+0x20/0x20 [ 3174.265860] ? do_syscall_64+0x26/0x620 [ 3174.269845] ? lockdep_hardirqs_on+0x415/0x5d0 [ 3174.274440] ? trace_hardirqs_on+0x67/0x220 [ 3174.278780] do_syscall_64+0xfd/0x620 [ 3174.282598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3174.287790] RIP: 0033:0x459819 [ 3174.290989] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3174.309904] RSP: 002b:00007ffb25899c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3174.317646] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 3174.325020] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 3174.332303] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 3174.339583] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb2589a6d4 [ 3174.346869] R13: 00000000004bfc7c R14: 00000000004d16d8 R15: 00000000ffffffff [ 3174.354173] [ 3174.355803] Allocated by task 18204: [ 3174.359535] save_stack+0x45/0xd0 [ 3174.363001] kasan_kmalloc+0xce/0xf0 [ 3174.366722] kmem_cache_alloc_trace+0x152/0x760 [ 3174.371403] bpf_prog_alloc+0x216/0x2a0 [ 3174.375395] bpf_prog_load+0x558/0x1400 [ 3174.379383] __x64_sys_bpf+0x32b/0x4c0 [ 3174.383290] do_syscall_64+0xfd/0x620 [ 3174.387110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3174.392415] [ 3174.394046] Freed by task 1473: [ 3174.397343] save_stack+0x45/0xd0 [ 3174.400802] __kasan_slab_free+0x102/0x150 [ 3174.405046] kasan_slab_free+0xe/0x10 [ 3174.408850] kfree+0xcf/0x220 [ 3174.411980] bpf_jit_free+0xa5/0x300 [ 3174.415708] bpf_prog_free_deferred+0x2f6/0x420 [ 3174.420474] process_one_work+0x989/0x1750 [ 3174.424739] worker_thread+0x98/0xe40 [ 3174.428550] kthread+0x354/0x420 [ 3174.431930] ret_from_fork+0x24/0x30 [ 3174.435643] [ 3174.437279] The buggy address belongs to the object at ffff8880a5596480 [ 3174.437279] which belongs to the cache kmalloc-256 of size 256 [ 3174.449957] The buggy address is located 96 bytes inside of [ 3174.449957] 256-byte region [ffff8880a5596480, ffff8880a5596580) [ 3174.461757] The buggy address belongs to the page: [ 3174.466705] page:ffffea0002956580 count:1 mapcount:0 mapping:ffff88812c3f07c0 index:0x0 [ 3174.474867] flags: 0x1fffc0000000100(slab) [ 3174.479121] raw: 01fffc0000000100 ffffea0002913d48 ffffea0002342848 ffff88812c3f07c0 [ 3174.487028] raw: 0000000000000000 ffff8880a55960c0 000000010000000c 0000000000000000 [ 3174.494916] page dumped because: kasan: bad access detected [ 3174.500716] [ 3174.502347] Memory state around the buggy address: [ 3174.507286] ffff8880a5596380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3174.514658] ffff8880a5596400: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3174.522031] >ffff8880a5596480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3174.529397] ^ [ 3174.535910] ffff8880a5596500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3174.543293] ffff8880a5596580: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 3174.550662] ================================================================== [ 3174.558088] Disabling lock debugging due to kernel taint [ 3174.563605] Kernel panic - not syncing: panic_on_warn set ... [ 3174.563605] [ 3174.570980] CPU: 1 PID: 18204 Comm: syz-executor.4 Tainted: G B 4.19.59 #32 [ 3174.579389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3174.588756] Call Trace: [ 3174.591365] dump_stack+0x172/0x1f0 [ 3174.595018] ? bpf_prog_kallsyms_add+0x7c5/0x840 [ 3174.599872] panic+0x263/0x507 [ 3174.603081] ? __warn_printk+0xf3/0xf3 [ 3174.606978] ? retint_kernel+0x2d/0x2d [ 3174.610890] ? trace_hardirqs_on+0x5e/0x220 [ 3174.615227] ? bpf_prog_kallsyms_add+0x7c5/0x840 [ 3174.619991] kasan_end_report+0x47/0x4f [ 3174.623976] kasan_report.cold+0xa9/0x2ba [ 3174.628138] __asan_report_load8_noabort+0x14/0x20 [ 3174.633082] bpf_prog_kallsyms_add+0x7c5/0x840 [ 3174.637857] bpf_prog_load+0xf7e/0x1400 [ 3174.641845] ? bpf_prog_new_fd+0x60/0x60 [ 3174.644531] kauditd_printk_skb: 250 callbacks suppressed [ 3174.644545] audit: type=1400 audit(1563293395.264:115480): avc: denied { map } for pid=18200 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3174.645926] ? selinux_bpf+0xe7/0x130 [ 3174.645946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3174.651390] audit: type=1400 audit(1563293395.264:115481): avc: denied { map } for pid=18199 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3174.675483] ? security_bpf+0x8b/0xc0 [ 3174.675499] __x64_sys_bpf+0x32b/0x4c0 [ 3174.675513] ? bpf_prog_get+0x20/0x20 [ 3174.675535] ? do_syscall_64+0x26/0x620 [ 3174.713144] audit: type=1400 audit(1563293395.264:115482): avc: denied { map } for pid=18200 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3174.716619] ? lockdep_hardirqs_on+0x415/0x5d0 [ 3174.716638] ? trace_hardirqs_on+0x67/0x220 [ 3174.725162] audit: type=1400 audit(1563293395.264:115483): avc: denied { map } for pid=18199 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3174.748524] do_syscall_64+0xfd/0x620 [ 3174.748544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3174.748554] RIP: 0033:0x459819 [ 3174.748568] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3174.748580] RSP: 002b:00007ffb25899c78 EFLAGS: 00000246 [ 3174.803193] audit: type=1400 audit(1563293395.264:115484): avc: denied { map } for pid=18199 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3174.812653] ORIG_RAX: 0000000000000141 [ 3174.812662] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 3174.812669] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 3174.812675] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 3174.812681] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb2589a6d4 [ 3174.812688] R13: 00000000004bfc7c R14: 00000000004d16d8 R15: 00000000ffffffff [ 3174.820957] Kernel Offset: disabled [ 3174.889324] Rebooting in 86400 seconds..