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"}], 0x1170}, 0x100000001}, {{0x0, 0x0, &(0x7f0000004d00)=[{&(0x7f0000004c40)="b0c42d44ece2cb40d721fc1914e10c6088a309e2dfeac216c84139f7f79b35353adf897dd295ddf4164af3de80a691ca61f33760eba4f75de88b687bfd1cf4745d0552576f99e384fbb83b98c94a4c8fb0219d95947c57a2ec86f5115b47829e4b126ff8b9b67d87c781bd5d11a0e354a256b70377f488d882f3534cab4a2138aef924d69c2a975cbbeb9c4ee56492e688b36afe9c07c4da3189cbc0c656215e8a369d1d", 0xa4}], 0x1, &(0x7f0000006fc0)=[{0x20, 0x108, 0x6, "5f930448170e2d435b7e5e"}, {0xc8, 0x44348bb4cd4ab122, 0x7, "f9980faf2a8b693bfc57493f1ee152d3c95b0a491aa05202378edd128ff4274b2671b3cb5bc8d61b4c17c569f751f2a02b2dae36521001c61bdd1e20cb4bfceecef513586f3310fe0c93130aaabd83d9b00447ed15c64b2c07f3d77f93fd549615dd8c375d66d3c52883e7fd21cb4bc8a211e45fb0b80d8ea4f9480e9a634c0ba93867f6dddbae4020260e949c59a187439d3d8f91aa6c51992eb26fb3399db2b4ec0e97ac23b1fe86b7a89c0d68cf993ddf525dbc04"}, {0x60, 0x6, 0x4, "8c81d7478b7fc9dc6c9c7b0611060b67ae32f2c955addc3afc0c8988760e35318f52fe4b9a64d9ad20c3c90793fa4c9da3dd68f2dd55a146ce9cad92697df12b206223d552c99c2346"}, {0x30, 0x116, 0x9, "b94e325efb4df08ab76c1ace27b65354702a73be9c0a22bb4f"}, {0x58, 0x111, 0x20, "e29c8f5fff02f10dde9b311e195028fb7e6529f71415b40b9e3261cbbba40ce205c9dfe7701770c83b012882871e972849fbeaccd6479186562af4704e79ed7e66d91b3cbf06"}, {0xa0, 0x1, 0x4, "c9daed21d97cdb3f8a740a95385c7e0d2880e5d1ea3cd8893c6dc71abf3aa8a58c78b121d2bc51922460c87c2d478ea3bee734c0973119e0fdad8d532a463c3dabb781de65b4107fd541ea6a62af077de5d1e1f980596876a44a322eab04ed7626868cbdaa260ca2b189323f8540abbf212fbe0fdc778cb4031b2aa4e9af3b674229233f034a6df4e5b4"}, {0x18, 0x1ff, 0xfb0000000000, "dfe440b6"}, {0x18, 0x109, 0x85bd, "e7dc"}, {0x50, 0x11b, 0xc5, "9b2eca8c47eefb2363471a003a21f7b07c2a5481b09c60d8d3c7c86b05374211f6470e47df5d121e06526a4491960b729d27719a60d8d8fc5bcb6fdcacc7"}, {0xb0, 0x102, 0x3, "853311f88d5351b32f61d31050e4b80c42a4c8d72e58691deea78f8f0c3413f8dc95fa5c62ec710f08d500f3d2936c89a165b9a6283a3d55b48aad6168e66a1bbdb9fd65a99fbe71b2dbff4acc4fb0caec00185d8b7e7a52603f8ab6be06f7ef8e1db20afde8e870bd3daf5ac7c0b53e2c5d60a955657540d631635dbea7e767abeadf5c4d40fb7d02a6b4601ebe9ba0ef977cb681678b407096f27be183c0"}], 0x3a0}, 0x3}, {{&(0x7f0000004d40)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @loopback}, 0x4, 0x0, 0x3, 0x1}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000007380)="54733a625df6497a184d9b018b01f9b8cd344a945951fb5f28a60a94cfe7c98a202191fae4eb7c9d10e50ea48293284dd3aebb2cf4db7cd3305d32a55bde9f88251ed628856fcd7f8ace8eb60eaf205758d37661ba35d993b47194d513fb69f306c2976415f496276c293dcd7d3860e9f63ffc532fada32d782cc84202a6dbc4a62589ad98ce34c165c824b9718947c740a3d19514b2aedf4cb236a3d7e12c67a6", 0xa1}, {&(0x7f0000007440)="02a8aa65e33bd379e287fa7ef085091ee2a38764d52244f3687f99c5cadc09da9325c43ee46018a09c0155ff1652f86cd1edef7814d74cc37d41dea85239215d84a2ad2863b8c9bd6125915854dc70cab4178e2d00190dd09c857ab507a825ccfa6aa4b6fb7f9ebb69f8cbd2963a273347741fe8efff92192e608b6836f0382a799a070493bf97ec6974dd7e9342b493e2c10aac8fd9c50a39daec944b4bc6bdca3277ab9dbca420a17e42e6a22558f81f35ecf7d30b7e2a17e682e81fc3d8ada3cb2b20", 0xc4}, {&(0x7f0000007540)="f1e73201bb5e4a542e6f8791be99068915a57a942b58d3ecc431ee7aba7d82f747e287daecbd3478db60c72f07d1b6addcc5b32d0f9f6efb3ab3035a3d6e59e74a9cb37626c409dbe9d40b7dab58b5ce3f", 0x51}, {&(0x7f00000075c0)="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", 0x1000}, {&(0x7f00000085c0)="fe38e5db132a5e21c5b2cbedb5abcd82ff1c7b87cb4f19f22d124bc815d7b29ccddf423dd1c1bf56ede6cc94d08d5ec9c27e3d4fae9617827100c2930e81a4b4400647a929f42df2c0fe52ff5dcf85c0cb3aecf4feb0271ef4365bc83b1e4eb744bb47336ec8ee408143e5dce9b00fccf0b5a686d2c9ef228eec", 0x7a}, {&(0x7f0000008640)="3f5e18950e2c42af2088c8029847cc2753e4b29b9c5a208b6c845d8df0c34e1a7504f72cb636abfe5205d215d66388b04d7eb16bf7925caa929932b2e04edd724cae96657b995c7989607db23f4472fe", 0x50}], 0x6}, 0xff}, {{&(0x7f0000008740)=@x25={0x9, @remote={[], 0x1}}, 0x80, &(0x7f0000008b40)=[{&(0x7f00000087c0)="a505a18a9dbfeebebd44051d26a3bffa109104f558b47a2e3d963787283eb6d5050ce25d7dbaa01e0abf0e532fe8619a0bdd9770822a1a16c0730af8845e5e7e599e08ca7af989024386164b51c946b383bc9c2b7af7027ac1ca249dc8dda6717e37df4cb0d632d1bd376aa1d48ea967283f794a1f290a256800cc8cb47ae07230582f1f4b78d42527e5586cc94d511fb74378675b5259b58983b14ca0ebe2ec228dad28c82dfe7950c5879d16d33aea2a9d5e96fb1957c720aa33c063e5a2c023b17369094397275c33c33f58ee9c6d2b49c1c77457d5f60c30cac3906bb6d13f05d7ca937f8685fed672c9249e9eb8aacd4e5c6f87819963", 0xf9}, {&(0x7f00000088c0)="65c807a1cce1fad7e45df7e8e5a1193300e4e95dbe5a6e83dc2b6ca780df7fab9b8dcaecce18025798490aa9e9cabc89e42795c499dc7ec4022f7abafc80a841a53027917532eead99cddc1df4402b002f54c5f3c0050ac428030428bb5c37c34759c51b17640ca5f50f666fd8358d3ae102bca52573a5aae499c47bda08317a2c5e6e24666024545e4a882beb1bcbba42604763724cd3b6eb9b92", 0x9b}, {&(0x7f0000004dc0)="312182a000eeed9786b5391c12b0a3704f461c2d4aabafa0cafdd75e4481ea50871bab9877ee2a31e408c0f0474a881efd321e326a638c5d9e67", 0x3a}, {&(0x7f0000008980)="b51c938f8b7a763c54b1e690f4353c4616774f16a7ac407a82c1f5ab5d9c5d6fa914eb5c281a63fdb74eb9fa900b8f104a9cfc541cc2b8acba3c693c1a6351e25475d664684d76e9e18a749019812e313fbd5743085be80b7b57c5aa5e022be23c5cca1999fc30d62c2a14", 0x6b}, {&(0x7f0000008a00)="8c8ff76c3cc41a3f3fe0458c8022982d0ff37a40c6f28e73854e6af9628fa78316c2c16dc17a5d670653d6ac1b5a65596f3ea3060fbdb67998d8c2b208", 0x3d}, {&(0x7f0000008a40)="85b8cf3ae95c60638ef87a01fdd1a67f7861489ef5135019a0dea1017a174eb0749dd54e6a8582ebc85483ab8ac201ac3c96d47ac70e1823c29fc9e28fed7bd3093002b855f25ca955009f2da37c0432ca15af4b55abb2acfea59bbcbb7de9e03cdf929a", 0x64}, {&(0x7f0000008ac0)="d8cc95f4972a4eeb478ff1cf99299cb7938e2d9c0f6e1d748a9bd7c06e9b8973fb544d2854ad4ff6aa635730f5cfbdb7016579d06bb0d2455efa783f883915bc56eae4142a4c3b047057243d70871ad47312b94b812f8f3e", 0x58}], 0x7, &(0x7f0000008bc0)=[{0x88, 0x10e, 0x40, "71e562bf25f303bcd829e346e1ad27865807f625f8d81b5afaf2725de20cc467e56cd3f0be42a1ed6c15ea31f321eeaf72f2ae6419286ec399a1de0f5c719e31ccd353de3fb550e22a01908a1f6eadf0ab6b745c955689caf543a5de949fa60c3f3f52b49d5832852dcddcb1e36be8b72fb81012ab6f0908"}, {0x50, 0x84, 0x6, "d21598840b0ae9cf1fba1879660052f8da4fbaf500ca160fee12f46118e890726884720332cdcc9782f9d8bb828c1ee087085a3f9440e96fb8"}, {0xd8, 0x3a, 0x7c8, "11f5b7350b7343775939b60fe6f1aedf4ff301dbea6cc9052d0a183afec9b094d218c49033933e96fbbb417141b66d9c8d862fc614ed957b402c8c2c9c4e31c5cd6ff7ada135523739f5097d757309c2f058d89be28f011e1763a1bc58d9796eaf80c248695b3e6d815580679a04307b99e5f5c8fdf6ad4ae7990e751e90a176f2875c95d1b43b8785140c0a5fe2d6abf114fd694171d0aceecf89d97a67d6d61d7b5869c8f3488d0236b3c35614750a1aade295d32f879086421c88284fb6b27e"}], 0x1b0}, 0x6}], 0x7, 0x8010) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:09:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000600)="2425769ca64beb61a38d7f37c0447d4f84f08c4cd45dace058afc71e922006c914fd93f0d228370500000000000000623867f2490308b0b979000000000000000000000000eb3faec656d740f30a1ca9ddb65d6f28e23954b1b2f5f63abbb2e50140eae43d657ab068f757361bc9cad1536e05d9907723245fb6083d464bdbcf7e822fae055be5a34130bbbe5a2051e8", 0x90, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000480)=""/143, 0x8f}], 0x8}, 0x0) 09:09:28 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x44000, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1, 0x0) 09:09:28 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r1, &(0x7f0000000040)={{0x0, 0x7530}, 0x5}, 0x18) 09:09:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") accept(0xffffffffffffffff, &(0x7f0000000080)=@ethernet={0x0, @broadcast}, &(0x7f0000000300)=0x12) r1 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x40046109, &(0x7f0000000300)) close(r1) 09:09:28 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 09:09:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='status\x00') getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x11, 0x80002, 0x0) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 980.711344] input: syz1 as /devices/virtual/input/input64 [ 980.767824] net_ratelimit: 22 callbacks suppressed [ 980.767834] protocol 88fb is buggy, dev hsr_slave_0 [ 980.777966] protocol 88fb is buggy, dev hsr_slave_1 09:09:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") accept(0xffffffffffffffff, &(0x7f0000000080)=@ethernet={0x0, @broadcast}, &(0x7f0000000300)=0x12) r1 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x40046109, &(0x7f0000000300)) close(r1) 09:09:29 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000000) semget$private(0x0, 0x4047, 0x0) semctl$GETALL(0x0, 0x0, 0xd, 0x0) [ 980.997785] protocol 88fb is buggy, dev hsr_slave_0 [ 981.003016] protocol 88fb is buggy, dev hsr_slave_1 09:09:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000280)={0x0, 0x0, 0xc, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000040)="6b04ab6b2b10d7eca2920a96", 0x0, 0x0, 0x0, 0x2, 0x0}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) r5 = openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x3ffff}) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000380)={'filter\x00'}, &(0x7f0000000140)=0x54) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:09:30 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0xf, 0xffffffffffffffff, 0x80) 09:09:30 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 09:09:30 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347b009"], 0x82) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000) [ 981.717760] protocol 88fb is buggy, dev hsr_slave_0 [ 981.722997] protocol 88fb is buggy, dev hsr_slave_1 [ 981.728343] protocol 88fb is buggy, dev hsr_slave_0 [ 981.736123] protocol 88fb is buggy, dev hsr_slave_1 [ 982.105462] kauditd_printk_skb: 89 callbacks suppressed [ 982.105479] audit: type=1400 audit(1555924170.638:2793): avc: denied { map } for pid=17879 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f00000040c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 982.273253] audit: type=1400 audit(1555924170.688:2794): avc: denied { map } for pid=17879 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x2, 0x0) bind$isdn(r2, &(0x7f00000000c0)={0x22, 0x4, 0x2, 0x9, 0x2}, 0x6) r3 = socket(0x11, 0x80002, 0x0) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000100)={0x0, 0x0, [], @raw_data=[0x100000001, 0x9, 0x1, 0x3, 0x2, 0xfff, 0x1, 0x8e0c, 0x1000, 0x1, 0x7, 0x6, 0x3, 0x7b, 0x8, 0xffff, 0x0, 0x9, 0x9, 0x400, 0x0, 0x3, 0x7ff, 0x3, 0x7ff, 0x5, 0x2, 0x3, 0xffffffff, 0x10001, 0x8, 0xe8]}) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) recvmmsg(r1, &(0x7f000000d1c0)=[{{&(0x7f0000003640)=@ipx, 0x80, &(0x7f0000003d80)=[{&(0x7f00000036c0)=""/3, 0x3}, {&(0x7f0000003700)=""/205, 0xcd}, {&(0x7f0000003800)=""/216, 0xd8}, {&(0x7f0000003900)=""/213, 0xd5}, {&(0x7f0000003a00)=""/191, 0xbf}, {&(0x7f0000003ac0)=""/250, 0xfa}, {&(0x7f0000003bc0)=""/127, 0x7f}, {&(0x7f0000003c40)=""/13, 0xd}, {&(0x7f0000003c80)=""/201, 0xc9}], 0x9, &(0x7f0000003e40)=""/72, 0x48}, 0x4}, {{0x0, 0x0, &(0x7f0000004300)=[{&(0x7f0000003ec0)=""/164, 0xa4}, {&(0x7f0000003f80)}, {&(0x7f0000003fc0)=""/122, 0x7a}, {&(0x7f0000004040)=""/61, 0x3d}, {&(0x7f0000004080)=""/77, 0x4d}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/149, 0x95}, {&(0x7f00000042c0)=""/21, 0x15}], 0x8, &(0x7f0000004380)=""/132, 0x84}, 0x9}, {{&(0x7f0000004440)=@in, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004e40)=""/4096, 0x1000}], 0x1, &(0x7f0000004500)=""/67, 0x43}, 0x8}, {{&(0x7f0000004580)=@x25, 0x80, &(0x7f0000004880)=[{&(0x7f0000004600)=""/219, 0xdb}, {&(0x7f0000004700)=""/52, 0x34}, {&(0x7f0000004740)=""/157, 0x9d}, {&(0x7f0000005e40)=""/4096, 0x1000}, {&(0x7f0000004800)=""/119, 0x77}, {&(0x7f0000006e40)=""/4096, 0x1000}], 0x6, &(0x7f0000007e40)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000004900)=@tipc=@name, 0x80, &(0x7f0000004c00)=[{&(0x7f0000004980)=""/186, 0xba}, {&(0x7f0000004a40)=""/191, 0xbf}, {&(0x7f0000004b00)=""/197, 0xc5}], 0x3, &(0x7f0000008e40)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000004c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004dc0)=[{&(0x7f0000009e40)=""/4096, 0x1000}, {&(0x7f0000004cc0)=""/237, 0xed}], 0x2, &(0x7f000000ae40)=""/113, 0x71}, 0xae}, {{&(0x7f000000aec0)=@nfc, 0x80, &(0x7f000000c180)=[{&(0x7f000000af40)=""/185, 0xb9}, {&(0x7f000000b000)=""/191, 0xbf}, {&(0x7f000000b0c0)=""/184, 0xb8}, {&(0x7f000000b180)=""/4096, 0x1000}], 0x4, &(0x7f000000c1c0)=""/4096, 0x1000}, 0x401}], 0x7, 0x2, &(0x7f000000d380)={0x77359400}) sendmmsg(r2, &(0x7f000000d780)=[{{&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x4, 0x2, 0x3, {0xa, 0x4e21, 0x20, @local, 0x38}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)="22913c70d23f31", 0x7}, {&(0x7f00000002c0)="7bd7ca202a342eb9441d3b07309f6f0e37c15e3e1d74e449e3a5a5fd6bd8820edbbee7230c78047213c314b08da3d0fd6b1044e9b9a33ca8f0153313786c7a102917a1556a76184b14f4a0d1aee240c8c6f135e222a18f1ec67f565275e5e4341f96188bee664566b7e09b99d2a58fabf3f29389fa47ca618d77", 0x7a}], 0x2, &(0x7f00000004c0)=[{0xc0, 0x0, 0x9, "71e36b23fa2e9ba72c5bd027337ace556f32825b06a3743b2f943f243c3366ca83f36e2b0a736fe2d347c53241642171b141375bd403305978e0ef72f35fd72704188262754e3d8be491f0fced4fc0c47511380f4e6f535b8eb869abd2ad3a51c76cea5658a43ee1534275cc9f89aa4d8d790f0ff6e8b7d5abbe2507b755e9004fb09373249596454c859428ba60f35abcbf40863ac42f7f56228cfe80d9c61017ff16f05143553940410342"}, {0xd0, 0x113, 0x1, "8d033fa664f449776d77aa39a03bf0f455f09ab4ccad7c6624a0b8d27f5763142d954d11f92415f3c95da648ac8af1d5965078b6b94c23e87816fa79b6828d1e8473cf4688e0ee9942638a4f4f22386be09b8526b370bd8b09b3383348a3b5ca832fce2e3321fa64f6d010df141de0fd1d6be749d0f595062f35542829d8f817be543b86d2d973421b657dd01f102104d4ba01717b88b3af0c9224976dd23fbc660dfccd8495a4b5552a7806a38bb0e73b6c22cd42fdee7067def586fd"}, {0xc0, 0x105, 0x5, "3e0b8039cd6c85ac56e676e72a159def3d76821c94015da57b16ab49ac9b637e1beb8727baac32ff3abb05b171f67a98a4661c64ab75584bb0cf50c0ecbcf8e222abe4d89cdf4aece5222b61eb4732c3e06a84749a3c76100d2f252b6b1430a3779c9058cf71169d936a44cd045b49bb8254103e41ef2c512fef406ed38792773346f4f11a6c8d7a973dac2743cdb19824d752e6a0324065564ce34c16954fca1112f67fcc83473d448678"}, {0x40, 0x101, 0x200, "a594733372024f1c68660d21f5967abbdf0a7491ea64e4e779c56dfc3c632fde5e96f746ab9e22675c95f4091fb8"}, {0xb0, 0x10f, 0x0, "abc91e83ab9aab88ff91535c779cb60d663922d73261e8f5297654c0a9410c7c5feca32cf1eb0ea3e0805a16cf600b0410e39c4da921ac83bf1aca54362d3d8c606b6aab4c9ccce4424ea90e603f295f266b51a06d2c175fafa4540e31132f31c582ab55316616ee5ae2ceda010ca96c3a7a365384c44bd0e934a3c66a78f1a9595dd790ea158eb29dd7589ac32327e8473b5c1a215541051ca2734479af"}, {0x100, 0x10f, 0x400, "cda8c1fb10924ffc1f406e3059ab3d7d01e243cc3035b2ae524bdbab51711bc67769bb0a18203a2de00cb997690984ebb908688c4e8637ef0f303e6d28f805baab6cc8685eb05fc7b37f019701d8e231c4d5d71921fdbc58ec4babb85b509d273c6d799810bfef948aaec869fcafbf43c06caba36d69572b5b8bc1ed4135a9fc3014e5f0a10709aac20a1ec5e455151841db93b8bff02f71418e7fc27c80d75004b2d33016c09423524057952a8a16312e82274e97d32f96f3298440006bc1d2e841da70d002e5239eebc2454058b60417aa99a9b0fd53e88621f04b00dfec7206db6fc544e5ff4b96478e"}, {0xa0, 0x119, 0x3, "ae57c1c597ae8db6ebf3333035a7f6ad816525b3914787289563862b32006ba2659407e93995507b5f7fd7a8923285ba68c18e822068e86e16953e2022c0243d5f285e7c1d0c5ee986aa7857724c809cd24278525b9daad5aad41f49875c04ed3fb196fff9f3e457e3e424f8c713a0e92c177d88db3488f03ed4b60dbe3292d07497574fc330433b9c6eb10e"}], 0x4e0}, 0x400}, {{&(0x7f0000000380)=@caif=@dbg={0x25, 0x5, 0x6}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="398921a1160b90f3387f9d7087c2dfa9327a441f4b30d48f11a8a25e9c4f9a6c2fcfda3fe9e88601b2e73be961716e05907ee852fb94c01503df65a0c614fdf4d13142cc43a0572816101bba7c46fea7749509e10a1554161aaf923cdb2ff0319c177b8add95673d493519", 0x6b}, {&(0x7f00000009c0)="4fc5edddf65d310afa25475f676c7958d6978cc980a26af7706493d59f3be5d9b919cb34097f841f25e94f9a3c8be392f9aba310d205c0c7b05861470a085f9a794ab4bd2228015cca23276bfd2101e9e8f475ed9e10e2f9ebc0edf14958157f8eadb64068233e03206226db0adfd01fdfc6cfd4b6dfda625a9a2d77793daaf1aec5385c7cc7ac4521596b16c8b52040fc520f0125a7be2d84e544f9ac1238034ca51eb98ab8a2eeeec2b70e57b792857e37957e26fc7a9ccefbcc7f213b6e5c3e2ef6de97433b98a7cac21f93de57cac89a601b3fd693303ebc4517c456", 0xde}, {&(0x7f0000000ac0)="a8b6db5007b198b66f69f1a4d47a6c7670e80314cb5d8beda51acc82c3", 0x1d}, {&(0x7f0000000b00)="1483dc6f10b467ac986bcc5d685cfe0de5b91761365d9ccccd0e8839d73d7b3ef936778bc6e2c3ae747b3d6e49ece32ca19fed255480630b98f02b0a01d0c8924442eb9fbf5e9dd0bc12ff0797b6b75b3fe1624ad914f48ffa59cf62aba2660f9c86bd75c7a6468017f2ee5debbda98678e74c90e483bddbc9f55861c54892ad61e738bc25f66fa07abdee9bb79cd3502be244bb654d57be78ccb797648763b84fadacacfa52924dce6da1fe9952e99a4c9f129ee29c8713e689cbae40e3aa020713ca07", 0xc4}, {&(0x7f0000000c00)="52dcbafe11f1af06b38ef12621d3e0aa4ab62aebf24da2b9ca99829bb07555bfcacba0eff0174220395631d87d6713428ceeee07622c965915a8ea2d225ffc321bff4dbd2a1f12ec08f3e35e1b59f9", 0x4f}], 0x5, &(0x7f0000001040)=[{0x1010, 0x10f, 0x7, "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"}, {0x30, 0x0, 0x400, "6b2365326cf4e87d0cc76f096ca15bf526cc36d7f44706d861a65757c3907d17"}, {0xd8, 0x119, 0x2, "4d93f09a888c525d4393e2fe7ba8cd192468cb689eeb68d90675724c16d1c2241595ae08625c8d60f7f5ee551dd16ba0c12ccbb2c64b5dec54bc49653a3c0793ed31ff62539f890fa665e8a5fcc76ea11f64228590ead5b43a0eb6bf0683e10659813e1a5672217f43b3065cfaeca33d4776591aab0291857f50c72d55dd72d2ba3f00b36792ab930124b57f4309ee70a25f668b5504df623f522f64e13cb023b584907a5c0fdacb0949598d008f54b90dc5be62ff30e0d6546d4ca7a48d1d6a0a2e1170951871"}, {0x70, 0x13f, 0x7, "d51d82d35197efaa0e11b0aa90270ea1378fccba45e79fc1880a4ea352f80e926e2049ee36a267f7d7f403f6a412bf7e8e64076dfb99c724437f9bd67933ffdb6c43d86a9404abeaf85396b8712b747ddc1704887437344f1c79"}, {0xc0, 0x11f, 0x40, "cfe55ae26d1b3194d7f4c5488c4ca8fed541fee0aa48593a6ba16ce3d9d76da11f635e20079edafa4f09ec16e7f3102adf08ff33b5a2515601b11795549c0c529ac1312945b9158395667c932925172b08546dd30d447979094d8275215afaf88f537ba064fb8d3bcc4415ae4a3c5b781541c5b7f477724e16b849abeacaa48a7563975a81c81bdd2b08661fbe2e36df22526ec81e3933002cec2c91c6664e537f56a1882e39f559beb49663"}], 0x1248}, 0x21}, {{&(0x7f0000000d00)=@nfc_llcp={0x27, 0x0, 0x1, 0x4, 0x5, 0x5, "b9155bb59f24a4d105b13cceff9c6aaaf2bcd22325fe3ed2e7f31d0b9021d79598d5c4bbf6919697e20f83f970f243fcbf26e6703686073e948a2ea00520be", 0x21}, 0x80, &(0x7f0000002680)=[{&(0x7f0000000d80)="38a223586f4b69329969369bb67efe846b5f81a586c5872fc6bff307b401c47b392cb8b6344075b707951230b14ef6a06db32607ac14c78ce3ef911701d751b0e2ce662cab183a54d027accd881f6e362871e9c89c18f37500314fd141", 0x5d}, {&(0x7f0000000e00)="d5b5ce1d61d19680e00e6699f292c9bea5a5d66ee2d1ecbdb106835aa15c7bd094749ca1089a61522130b0e4c70251a2acd5d055bff6dfbc2cde3219579911e3fb4443c24a720cac3ca665dd7fba588bce0a67988c9e1103ea0bf199f613f68bc0415fc60dc4436d26343d1568eca01c29a82016357a9b4dd4155913f069c66ea27fcce6a7487f54e20532ce27afc9c9e00fb4cb060dca38684519765fde7864436d17959ff5fa38899677ccde18310ef6ffc766d80b22e3659844a3df8fe89388174979f81c7ef85a3b3cd01eb88939b26d7cd530021b069879f4c46a0b4d3efd714dd3d7926ea9faff2125eef69d993d2f776402ec161bfe19", 0xfa}, {&(0x7f0000000f00)="298c520fffde8ae8ff76147d9f0c49204b63f2e2c9c5f8fd6ad1c9368260bd9aa3a95e1342b12909a30215026b1c06ef08d90efab98cc7a9", 0x38}, {&(0x7f0000000f40)="6065a92aed1584c6c406cfc9e512727f21286c6de69bafc02d389fbbd88c37c4a0b418b4f33703037699aff10df0356c84b327ce", 0x34}, {&(0x7f0000000f80)="164aef783fe85f320b8c5f683e42551932e390f674968c1b247b0e0bb3d2a5002975b4a7896ec30ac9a9e4b8e4dd59f0d4a123e244174b95d6f92165d8ff9ef71637ec10d1aafbab9a5d2d687c7e1be730ab61aaba23aa2f47e1a46b2c96fd9a79b560ace24fbdd7758af1d21edfa2b2f92cf66a3cfc1673518d", 0x7a}, {&(0x7f00000022c0)="4f98ab535fbb1c40d76b0946a2387932e90254d53c6087e7b06b1eaf8434b4376637adf7b191a465506f2f3dd371a6c04ae5c69c1f9b80f9397222d95f48b2110b914416113a495e3dd02fe60493821ede41b8bbdd60e537dfe4b2d85c0d3232495c4cad38adcf6be1d98773b070f9ade4c2968475fb55018d6e0d18d3064d0b46bcf6a9a94d0891c2", 0x89}, {&(0x7f0000002380)="73070dc82b3fd00e8ae69181da4ab2543c3d43304193f8c507b3e5b56b75484803ae28634ce488fc6eb977f2fb7b6f466f0fc1379e36e5bfdf08bb6fe2294e80e1ebba5becf62ab85897b21e95ee69d1ce9b43d1691e3710d8cc78e034bff8035d3ab85c955c6c3cf88246542bce11ba7abdbff9cea96b9209e0c17049c64fdc96a6171667c7fdefc07750bc36d2a392dd1a05574b1a104bd404c760f2d34e8448c9d793c64eca360efb0b9d82ce688a780f41c579d31f790a9c71b0fc5479ba52530d1c1d59d041885f0e21f1ac7a29e626b971157cdbf5ea54c5e724f6ffb0f1dcf46b5cd5af", 0xe7}, {&(0x7f0000002480)="38b86b57ed0512bcba1af847b5794e3bf4536b5f38449b", 0x17}, {&(0x7f00000024c0)="afef1b0aeb5b761234c50faf528f0efdd1044ecac716ae3adee27f12b9e5673146c65abcccd77ccbc7ddf46a706f1b0efefba4b6340d754f7f333f0ffb88c3b56fa2395b598ef9c95f1896d33308b97e5b660c74a8d0d69b7dc8faf53037d9852782511aa0ce400e6c4fe4741268ee8b019686e1f1a00bb5173598bb9f33a19c53bf7d0cb6eb25d9bcde9c49fdfc7f16b45fdd34dbd048fbb7e16c00c046968373324abcad7fbeeb0b211b2f28b3f56d9060c87f96bbde5a5b5a44f27b4a2e21672bcd4c6f74d86dc76fa6065b09dc5cb5c8ac30fca49fe58cfaf31c626058a37369511856723b76", 0xe8}, {&(0x7f00000025c0)="83e4a6135aa20acd60ee527d88279b94c176b87d0400bfe4d414ce342dc58d38978d4d44cf7af3062d4435b9b4e364ac1443d5aeed3e89c02b2bac4d8d1f90badb1fec17b08d927392699b425da44f50a5db6a1d00d1958019b28a0e02be8c4c121648940971664ce3a8611fbcc40cff09db40d1e5be2b74965b3951b0e5301c363374671b181f4858cd8683ab83b597e7223acb3a6f8992f49a69920730867c08cb616b40", 0xa5}], 0xa, &(0x7f0000002740)=[{0x90, 0x10b, 0x8, "34b7586b0cde1736cb8eefdeea21b33b9c031800a2aa422288255ff3aa0325786ae10f8bcafd9dc101dd1009296c14beb03a44fdcad2bed62d31e52133174c3dac72204424b3b86ca74d60d6b82f8dd03667b7a4bd84b5261c1dd22e49a0c7ed4cbc3ad9a96d40dc5cf9efff5790250dd0b87df7d82038ee71867f3182"}, {0xa0, 0x1, 0x3ff, "8c5256ab605d8e933afd46c3691a7fab80f09372841e41acb7145873863cef20aaa253aeb59154636295841648860ecf54a6dd7a62f6d1e745da3143f98c70383e1f745482d3bc5299ea3da2ea0cf63bad097430936543d51c9aa6ade173dc142f4a524b89781f08573e49ca361340c7020fb8113b709677908e16dae30c94d7eb0e3cba2099dd9186ee36b3d219"}], 0x130}, 0x4e}, {{0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f0000002880)="883f83f3c5e3f1c933cb428e7837e1586c102251de8e610d92273ec128b3f251d698bc48df75c2520aa100cf6149392b89d5a302e8933def4918b725304d17cdeb2bd6084062a5da08dd5064d0f0a1422acb3a71ecd7973a544a599b83a058ffd9e523a56ca76349f346a12945a494c7f7202ad57b", 0x75}, {&(0x7f0000002900)="38e3a55379f0f393a0b92dbb32d51dbb67e6b429a12652cb6ffa7d539ddd72272a7b494a52cb1cdf9984d52c", 0x2c}, {&(0x7f0000002940)="89d4a3079a8d5e358aa9ab3600bab56df7d357b92ee8002847d77c2baa3821e7fb9793c14d4062c2344b3340540646b072a8f69ad91dfa72753f1a60b72df2511012769e8783acbf259787412fef3c390acb00c720a3b8d257d4f5de46b0aef958530f9dc31a4a58da91a15fcb4b936a7474b780da769b71ac93db9ab44679f7f314c3aebbc9f3145d91a9d03aa4f4e81d5b0eac5e4d9601929796b4bb", 0x9d}, {&(0x7f0000002a00)="2dce33396a60cc502fce8dd5192ac98705cdb3e175dd3bd1b0cdf5c8d732eeb4a7", 0x21}, {&(0x7f0000002a40)="6d5a33da9cfca3b7e27c99d8496b275ded67f216b40c1cd3e342227e9402f1123224b058ab375e3de2e24ef3f0eab0877c17eee28ca51867be2ffad66226820b6e57238399d772a40d1bcda91cbb57e2502577f9a0ecd2f66b8f4608c4a334b447c123fe6f0b4196ab55b8117b6d1bb102f9f8771aa8d1702f75b0e803215d88ee3c8090f78b87a16e8682992f8a756c6f6fc987f1689114b1672d5cad5f4dd484733ca210f9be02d4825db86d88e674e09937e4fe8872", 0xb7}, {&(0x7f0000002b00)="7bddbcbffd2fa0e3cedabb77caefda7c4889b004503344325a822a3874b664128f0224d87ba789f0d385384569af077b3f564b9a7517504fd342d96f51809bfd1b92bad010425aadbe933dc1ef46a76593fb46cf823fe0214c84b134b8ec96573eece3ea6bf7bf36a11da089b01fbc768012c7adba16437f3b7d43d60e667e448829fcce3a15586cb8300d57df8a5495c7352aad801e8f0faf235c7ffa1711b57f179c635c8028f4b93ff0c017a7729cc27340a748882e38b5b79e2938fdc88173747862224552284cc3e61526250e0ce7d8137f6aa8dbba585f297c60b4fd", 0xdf}], 0x6, &(0x7f0000002c80)=[{0x48, 0x10f, 0x9, "9d9f91ce66d5253004187cbc849b847a8d25693af66a584f004934b4435b6b2f32c8c71b828fed86b35ad74d9b564319d6"}], 0x48}}, {{&(0x7f0000002d00)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80, &(0x7f0000003000)=[{&(0x7f0000002d80)="b67497aa5a3738329aa7aed37acf1dcc2e6890077251ebb8f61f6b27195ca48d205d8710097d3d08d435a9165a05f3908a3f5c47f196ca44553833b5363d6c577098ade0fbe6257710d06b4bd1ab279147cb8df7afb0b0f3933d69fe021fb6", 0x5f}, {&(0x7f0000002e00)="6f79a865ed78c2e94c200036dd94ab8ec882c4c149e71a0b6e4b0d94fbe9941a577632ba7bacde9160effc661adf1774645e29e99e5c410bd968ff7ce45509e34aff968bd9ffff3df237", 0x4a}, {&(0x7f0000002e80)="d0ca3b40c7c5b5e23571c6444103930a20156e9ac964b95f3ee0820b8fbc23d0bef308e6c66bb14c2eacbb761301a3f83ccb6b930fe43b4814cd2b4dcea1774608a066fde4119312478079e3e8aac72a0cd3fdf9fa1bf9240f87e5d324172ff932bd6ee22091ce18d2697fa63646", 0x6e}, {&(0x7f0000002f00)="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", 0xfd}], 0x4, &(0x7f0000003040)=[{0x40, 0x115, 0x6, "d5afd9ff0daa8e8d3692d8aadcee8d25cae9b0ba722604ef2f47342e39f4b462e270135b30b60b52bb5b8ad55f"}], 0x40}, 0x6}, {{&(0x7f0000003080)=@ethernet={0x306, @random="45d21cfa2724"}, 0x80, &(0x7f0000003380)=[{&(0x7f0000003100)="3de1f8b0f3ab007d1d4e958693d6e77ad84d9abc3aef1a446f5df687cd7d58752fde644ab8ffd5b8bcede1366784c10a1688ddeb56c00fcb53a7a6e224f42d2af53720e24a32d5487f711b50fe4713c48bb7b55d6d2ddcd2fc439aa80f48ddb218649c646d2ef7e25dfdc59953959ac23affe2fd8d99c62953861e9be29804c696c6ab31860d458153d8a008", 0x8c}, {&(0x7f00000031c0)}, {&(0x7f0000003200)="159e538b16406064f1eb9d2640136c7499865956ffa73015ae14925cab007cc292b872d6972bb69a1c851b3f5df783dc2993b6f32f17a3e8b07cf84976fa21457614f3f1bcb972998b28007ac66aed1358c84180742d46cb1bda863c8a094cb57783f96f6b4851684bcd9602036a3f4e020c9761af51c3306db4b5b86782b18de69aa2c232d157003f9ebdb5ac928764aed87eaa5371a551e907f1d39ee6d965a2fd6a", 0xa3}, {&(0x7f00000032c0)="29340dc77b4f1b88ee5edef022cb0b62742d45f82949a107b1533f12eda7e4fcc4a95f65171b985155c9b39da37cf3246e7d1c8776441b7524cb5257e5eeb72f8d56f8f1eac5ff41a53f302afb888222fe8983818041004438c860ea739123b89a84202ad99898f9f56622c9b93c3b39dad297a51ec17621eb1098e0633046b05e366e5a1a3a3f35b0bfd47fa00bc92e4dea62d5716d72c578cbc4da982c6ea0b92f22d72efc6d1a7934bf032bf65e", 0xaf}], 0x4, &(0x7f00000033c0)=[{0x68, 0x10f, 0xf8, "5770181f84374bc80e3aa21b77a8b3b3cc37859f192821b8c790f38f84019c307a5f43459d158a38c28930e7fdbb08bab2c5c2a4dbd9bc93e7cc330d35e1b8ad19befd265a41633a01e2cef15ce2c7d1dd0d"}, {0x18, 0x119, 0x1f, "8999d70017"}, {0x100, 0x1, 0x3, "25014a5a30f33cff95719ef086ed8cbdc162816404e904ceb94b5488160b57baa7731d6e8c6075abd016ca832a87eb0a54d5caa56ba876ad6cf57c58abaa1d48daa229b6d51f71ec5c23b1abc38ff7960f377c757aa6edfb738e868775050e5b12a3ae24cfc1efb5fc7a3492bc621967341cb56b86456e7534088b23fd4be8deadc1785a374053eae4dcbd8ed3128f4136be4d00286507ddec13e7d944e3d155c89e5d87dbe5b31c189b47ca043ae4d1cdd211c438ce0c947d23f552b56fbbbf0b336cb21928c4d53d66e28c9e2bb445ea5a964630bb2d8b2c92ef3184d56840615300fc9233564907720fb8e733"}, {0xf0, 0x104, 0x7, "10e1eb98fc3974cee547ab36f74d8cb87e21876ccf44a6f5f0bf7c028af8eea8e8911dd64dc80498df2e66b46b6bf6bda3b493b0f686817e6f69d0a72a3608b09133be74a8734d53f76dc903109d95f117b51d49bc6b995202449f4c881bec3a0a3eb2ed6448660ceaba7db599fcf1eb0970985ad9de5af3c58ba0f9a615ba87eef7a1b965bdb7eb9c8933a639ed06866eba6cd1ec0e71dd0b964846998410d8ebe3da42e0588c4fca7b1191e5a546277dffd7247fb9a714170627d4cbe1f61ff351c95a1b4aa446ae001bbd749aaa3c7e59f6eeba2c4d9b295fc4628f894825"}], 0x270}}, {{&(0x7f000000d3c0)=@ll={0x11, 0x1c, r4, 0x1, 0x80000000, 0x6, @broadcast}, 0x80, &(0x7f000000d5c0)=[{&(0x7f000000d440)="865b177d640b7bcbb68643b908207087e51aec05142c48ebd81e99cfdc320a0ead456eb31e0b58d17cf9bfc42eac80e8e645935d7d2fbf73e6c1f639072064101409c213acf4a35ed6842e4707606ba31f5cc2c07f897391d6fa609036820e65fdc2b0cf4613c13784c0b5786b", 0x6d}, {&(0x7f000000d4c0)="b39c5d3e9dd599f8160cb195da72fa550daedf1e69b666b3917b2be1e7546148732924c5e58f8ae634eeaf68c933564f626c0cf4e51a47f4061af26c25407ded512a6b78eab5523301a74db040a5743905bba6f263a57e6be0d3458eb71c9917786a983140a03009756476a7d37a6910aef43116e92efe57fa481a08f3003be7fcf9ce6b7c3bdddcb79183fd779cb233675f3df4798d8ec7b45b615e15bfa4bd26eb19ce690095ae71ef74494077dadd58d2285de220c2903272a3aaa8c816e4518e9efa03e9866962619e05ecacac570c66fe3b719435e647b2a2ed58fa71", 0xdf}], 0x2, &(0x7f000000d600)=[{0xa0, 0x1ff, 0x7f, "105ba9e938f36584a9b66872c5009e527af15842bacfe3e8830c3f49492f2d483735725ed3136a60b5e04f403913e57601f3f67b25aa0a76f7cf677e6b55c5edee2d43f9d22e9c5f5c38c74e8c6106fedaccc307c279c257b01d7204e8c7bb5f00b090cb6252632b77a423a26a31f0b30f41d371cb0259da890d14f7c602c98042747c9d276b50752b"}, {0xb0, 0xff, 0x2, "60328e5078c472f5c37c188a704ca38f498819be721485bc1df17853d844730914c536d63a62ecc46dc365e20ad9c191a871ea8884d1d7fd33db12a2d56854169acf818f4d2a9aa7ddd7ab6a56feee1d62eb7ef06eed314786b832b6a6ebc63e984fe932eb4073997567f88982aeb772d425ab455e0526f9f50ca07c7ddf9d3ca494c2578c3561dbc076200b6e527185492abeb38ea7162f8d28308fc38a"}], 0x150}, 0x7}], 0x7, 0x2000c040) [ 982.449275] audit: type=1400 audit(1555924170.798:2795): avc: denied { map } for pid=18042 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 982.527754] protocol 88fb is buggy, dev hsr_slave_0 [ 982.532930] protocol 88fb is buggy, dev hsr_slave_1 [ 982.568660] audit: type=1400 audit(1555924170.838:2796): avc: denied { map } for pid=18042 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 982.714388] audit: type=1400 audit(1555924170.858:2797): avc: denied { map } for pid=18042 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) syz_open_dev$adsp(0x0, 0x0, 0x0) listen(r0, 0x501) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x3e8}}], 0x500, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x34000) [ 982.877743] audit: type=1400 audit(1555924170.878:2798): avc: denied { map } for pid=18042 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:31 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) rmdir(&(0x7f0000000040)='./file0\x00') [ 983.007713] audit: type=1400 audit(1555924170.948:2799): avc: denied { map } for pid=18042 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 983.151281] audit: type=1400 audit(1555924170.968:2800): avc: denied { map } for pid=18042 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:31 executing program 5: syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, 0x0) r1 = memfd_create(&(0x7f0000000100)='\xac\x00\x00\xfeRX\xea,P\xee[\xd6\x15+\x9f\x16\xf6\x92\x00}\xbe\t\x11\xdf\xf0\x03\x8e\x15\x97\xc7\xe5L\x9c\xbc\xb7\x8dQ\x9b*\x18\xd6\xdb6\xf9\xdd7\xd5\xa0sJ\xe2\x8ar\x81\xa2F\x96I\xb7\xd7\xb8\xceRi.\x90\xb9\xed\xc2\a\xf9\xfde<}\xa2\xa2M\xfe\xea\xcc\x8eJ\x063m\b\x82\x17Y\xccM\xc7z\xa0\x19\xf0|9\x05\x9es\x8cIx\xdf\'\xda|\x16\xb2u]\xdf\xd5\xbf\x19\x15T\x9f\xb0\x00\x9f\x0en6\xaa\x16P\x89\xf7\x8d\x85\x86.^>Ge\xd6\xf4O\xc2\xd5\xc3\x97\xdc8\xed\xba\xff\x1e\xa4~\xa6_\xde\xaa=F\xb1\x88\x16UE\xfc\x99[\xe6]\x9d\x9ciS\"\xe2\xf4\xb7\x00\xf1\xa8/6\xa0\x13;(\xcb\xc8\xaa\xa1\aC\xc1\xd3\xb7\t\xd60E\xf5\\I\x14E\xe9\xf4\xf6I\xfc\au(\xb7W\x1e~\xc9-\xeb\xa0\xde\xf8\x12\b\x90\xc40\x01\xf20\x16\x8ei\x1bz\xb8v9\xaf\xd973+\xa2\xf1\xb4;t\xfd\xfa3\x92Bf\x8d\a\x98*!\x12\xa4\xd8\x81\x9e\x80\xa4\xa2Q1\xef\xf7\xf6v\xe7/\x8b\x11$\xff\x16\xd1-\xf7\x19\xfaU4\x90\xe7\xa6\x9bJ\xb2\r\xc5\x8d\xfeUw\xa6\xe2\xbe\xcfO\xde\xbd\xcc\xde\xcf\xd7_i\xcd\xe4}\xa5\xcc!\xb0)\xd4\xdc\x91\xb8\xda\x8dh\xda\xe2p\xd5tdb\x01\x14\x84\x8di\x9bT\x9c\xb8\x17\x92T\xfb\xfb0\x95\xb6m/l\xe8\x8efs\x19!\xb3\xb5;O0\xa5\x1b\x04\x05p\xd69\x06Ud*n0>\xf5\x8bx\x83\xe9\xa2iG7\xa2\x9b\t\xccN\xbf\x19\xa3\xe4', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeefffdef) [ 983.283714] audit: type=1400 audit(1555924171.028:2801): avc: denied { map } for pid=18042 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 983.431201] audit: type=1400 audit(1555924171.088:2802): avc: denied { map } for pid=18042 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:32 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) connect$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3c2, 0x0) 09:09:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="24000000160007041dfffd946f6105000a0081001f00000000630800080004000400ff7e", 0x24}], 0x1}, 0x0) 09:09:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x2, @local}, 0xffffffffffffff2a) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:09:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0xffe) 09:09:33 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet(0x2, 0xfbb0ef9d6bddbbf1, 0x0) accept4$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x801, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2b}, 0x60) listen(r0, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x0) wait4(0x0, 0x0, 0x1000000a0000008, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x80001, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0xa0400, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) [ 984.666851] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 09:09:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x18f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r1, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 09:09:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8ff0000000069a2f8ff0000966f1503db0cfd2a0000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xffffffffffffff87) r0 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2f, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6009, 0x1) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 09:09:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$radio(&(0x7f0000000fc0)='/dev/radio#\x00', 0x0, 0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000004040), &(0x7f0000004080)=0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x800, 0x0) r4 = socket(0x11, 0x80002, 0x0) bind$packet(r4, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000180)={0x5, &(0x7f0000000140)=[{}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f0000000200)={r5, 0x3}) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) write$P9_RFSYNC(r3, &(0x7f00000000c0)={0x7, 0x33, 0x1}, 0x7) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 985.877738] net_ratelimit: 18 callbacks suppressed [ 985.877748] protocol 88fb is buggy, dev hsr_slave_0 [ 985.891394] protocol 88fb is buggy, dev hsr_slave_1 [ 985.896672] protocol 88fb is buggy, dev hsr_slave_0 [ 985.902029] protocol 88fb is buggy, dev hsr_slave_1 09:09:34 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc008551b, &(0x7f0000001000)) [ 986.496651] print_req_error: I/O error, dev loop3, sector 64 [ 986.519206] print_req_error: I/O error, dev loop3, sector 256 [ 986.525624] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 986.557219] print_req_error: I/O error, dev loop3, sector 512 [ 986.565317] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 986.599704] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 986.634418] UDF-fs: Scanning with blocksize 512 failed [ 986.663706] print_req_error: I/O error, dev loop3, sector 64 [ 986.672640] print_req_error: I/O error, dev loop3, sector 512 [ 986.678764] protocol 88fb is buggy, dev hsr_slave_0 [ 986.678825] protocol 88fb is buggy, dev hsr_slave_1 [ 986.678932] protocol 88fb is buggy, dev hsr_slave_0 [ 986.678982] protocol 88fb is buggy, dev hsr_slave_1 [ 986.719072] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 986.755755] print_req_error: I/O error, dev loop3, sector 1024 [ 986.765571] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 986.815032] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 986.857807] UDF-fs: Scanning with blocksize 1024 failed [ 986.889463] print_req_error: I/O error, dev loop3, sector 64 [ 986.897555] print_req_error: I/O error, dev loop3, sector 1024 [ 986.907426] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 09:09:35 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000500)=[@release={0x40046306, 0x1}], 0x0, 0x0, 0x0}) [ 986.958049] print_req_error: I/O error, dev loop3, sector 2048 [ 986.966943] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 986.997748] protocol 88fb is buggy, dev hsr_slave_0 [ 987.002888] protocol 88fb is buggy, dev hsr_slave_1 [ 987.016668] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 987.077073] UDF-fs: Scanning with blocksize 2048 failed 09:09:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x18f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r1, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 987.147019] print_req_error: I/O error, dev loop3, sector 64 [ 987.153363] kauditd_printk_skb: 69 callbacks suppressed [ 987.153378] audit: type=1400 audit(1555924175.678:2872): avc: denied { map } for pid=19608 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.221899] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 987.282728] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 987.312362] audit: type=1400 audit(1555924175.738:2873): avc: denied { map } for pid=19608 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:35 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc008551b, &(0x7f0000001000)) [ 987.353827] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found 09:09:35 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) [ 987.409989] UDF-fs: Scanning with blocksize 4096 failed 09:09:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2c, &(0x7f00000002c0)={0x100, {{0xa, 0x4e22, 0x7fff, @mcast2, 0x8}}, {{0xa, 0x4e23, 0x3a80000, @mcast1, 0x20}}}, 0x108) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000000100)="1d9c4ccfb8d9552ad78d968f11011340cd310ebc26192a5bdbb230dd15bda8cbd2916e7578f106adbf4cd972bebd8d7da7cefb00f4015cb75a7889a1f699c72444ceedec82c677cd9c88e7e60a0c7b8a5382ffe4a5d72f3fa77f0dff0008000000b196ffe81d38c42a0841c36e1b86ea2f89b2b5a342428f29f10b1b6d91a67979e6753adbf9f1", 0x87) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x8082, 0x0) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0xffffffffffffd35, &(0x7f0000001fc0)}, 0x20000000}], 0x400000000000047, 0x0) [ 987.467982] audit: type=1400 audit(1555924175.738:2874): avc: denied { map } for pid=19608 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.499275] UDF-fs: warning (device loop3): udf_fill_super: No partition found (1) [ 987.587362] audit: type=1400 audit(1555924175.798:2875): avc: denied { map } for pid=19608 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.699368] audit: type=1400 audit(1555924175.878:2876): avc: denied { map } for pid=19608 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.788658] audit: type=1400 audit(1555924175.878:2877): avc: denied { map } for pid=19608 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 987.899688] audit: type=1400 audit(1555924175.918:2878): avc: denied { map } for pid=19608 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 988.056854] audit: type=1400 audit(1555924175.988:2879): avc: denied { map } for pid=19608 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:36 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 988.186915] audit: type=1400 audit(1555924175.988:2880): avc: denied { map } for pid=19608 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:36 executing program 0: syz_emit_ethernet(0x32c, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x2, 0x2, 0x0, "10d1f6", 0x0, "071ccd"}}}}}}, 0x0) [ 988.308074] audit: type=1400 audit(1555924176.068:2881): avc: denied { map } for pid=19608 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 988.464544] Unknown ioctl 19299 09:09:37 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x8, 0x0, 0xa5, &(0x7f00000002c0)="e3e0d065ec607f48a097e825e5c3f29cd804a7a355290fec9f118ad726f0b5d13e67b4bf63a601e7e2b6b6f26ed385a256336526c8aedecffe725145a55485e6d002595e562ccbba34f811079faf63b81801bcc7bd9b2ce4886ae8ae7d99ac0df371f1f9dae674767bb690dfa20afa34ed5e30c4b36254d1aa1d23eceff795048837d00a0ff90ea4a517668328fd1f40c7b51eaa1188572be21a659c27b72e8a604192ef54"}) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) statfs(0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req={0x0, 0x2}, 0x10) syz_open_dev$mouse(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204006902000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 09:09:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x18f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r1, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 09:09:37 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc008551b, &(0x7f0000001000)) 09:09:37 executing program 1: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 system_u:system_r:kernel_t:s0 00000000000000000002'], 0x60) 09:09:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x3, @empty, 'bond_slave_0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f0000003100)=[{{&(0x7f0000000780)=@can, 0x10, &(0x7f00000008c0), 0x0, &(0x7f0000000900), 0x37b}}, {{&(0x7f0000000c40)=@can, 0x10, &(0x7f0000001e00), 0x21a, &(0x7f0000001e40), 0x32}}], 0x2b8, 0x0) 09:09:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x1ff) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x5, 0x30, 0x0, 0x5}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x4, 0x4, 0xfffffffffffffffa, 0x7, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000001c0)={r3, 0x2, 0x4, 0x0, 0x3ff, 0x400, 0x80000000, 0x4, {r4, @in6={{0xa, 0x4e23, 0x1f, @empty, 0xb852}}, 0x1f, 0x3, 0x6, 0x101, 0xffffffffffffffc0}}, &(0x7f0000000280)=0xb0) 09:09:38 executing program 2: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x3) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000003, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r2, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x6a1) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x8000001a, 0x0, 0x0, 0x0) 09:09:38 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc008551b, &(0x7f0000001000)) 09:09:38 executing program 1: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 system_u:system_r:kernel_t:s0 00000000000000000002'], 0x60) 09:09:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x18f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r1, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 09:09:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x801, 0x0) getsockopt$sock_buf(r1, 0x1, 0x200000000000000d, &(0x7f0000499000)=""/35, &(0x7f000020a000)=0x23) 09:09:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000200)=0x3ff, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x100000001, 0x4) getpgid(0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000240)={{0x20}, 0x1, 0x3, 0x6, {0x80000000, 0x9}, 0x5, 0x10001}) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 09:09:39 executing program 1: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 system_u:system_r:kernel_t:s0 00000000000000000002'], 0x60) 09:09:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x101002) r3 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x9, 0x120012, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f00000000c0)={r3}) r4 = socket(0x11, 0x80002, 0x0) bind$packet(r4, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 991.157756] net_ratelimit: 22 callbacks suppressed [ 991.157765] protocol 88fb is buggy, dev hsr_slave_0 [ 991.167931] protocol 88fb is buggy, dev hsr_slave_1 [ 991.397910] protocol 88fb is buggy, dev hsr_slave_0 [ 991.403148] protocol 88fb is buggy, dev hsr_slave_1 09:09:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="0202e2090c000000ffffffffffffffff02001300020000200000000000000000030006000000000002004e20e0000001000000000000002402000100e00000012000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) 09:09:40 executing program 1: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 system_u:system_r:kernel_t:s0 00000000000000000002'], 0x60) 09:09:40 executing program 0: socket(0x10, 0x803, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000000240)='/dev/loop-control\x00') unshare(0x20600) prctl$PR_GET_TIMERSLACK(0x1e) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) r2 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) fstat(r2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x3f, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000800)=ANY=[@ANYRES32], 0x1) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000040)) setuid(0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_MCE_KILL_GET(0x22) readv(r1, &(0x7f0000000080), 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) [ 992.117739] protocol 88fb is buggy, dev hsr_slave_0 [ 992.123071] protocol 88fb is buggy, dev hsr_slave_1 [ 992.128426] protocol 88fb is buggy, dev hsr_slave_0 [ 992.133625] protocol 88fb is buggy, dev hsr_slave_1 [ 992.199458] kauditd_printk_skb: 77 callbacks suppressed [ 992.199475] audit: type=1400 audit(1555924180.738:2959): avc: denied { map } for pid=20776 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.385405] audit: type=1400 audit(1555924180.778:2960): avc: denied { map } for pid=20776 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet(0x10, 0x2, 0xc) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000020307051dfffd946fa2830020200a0009000100021d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 992.573944] audit: type=1400 audit(1555924180.878:2961): avc: denied { map } for pid=20776 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:41 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x990001}) [ 992.727367] audit: type=1400 audit(1555924180.888:2962): avc: denied { map } for pid=20776 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.882339] audit: type=1400 audit(1555924181.248:2963): avc: denied { map } for pid=20962 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 992.917770] protocol 88fb is buggy, dev hsr_slave_0 [ 992.922949] protocol 88fb is buggy, dev hsr_slave_1 09:09:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:09:41 executing program 1: rt_sigaction(0x4, &(0x7f00000002c0)={&(0x7f0000000000)="c4e17a707a6593c6c70066450f73ddbd0f607d32c40139164c9a000f478e0c000000c4837d19e400c4a2c0f79500000020410f01ef44e000", {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000480)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000500)="8fe97881834a32ffb3c48215a88700000081f01033c40105d1df0f414068c4a2199db500f8ffff670f5c62ffc481fa6fa406840000006766460f7cc4c4a17c77") [ 993.009252] audit: type=1400 audit(1555924181.258:2964): avc: denied { map } for pid=20962 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 993.132168] audit: type=1400 audit(1555924181.258:2965): avc: denied { map } for pid=20962 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 993.261987] audit: type=1400 audit(1555924181.288:2966): avc: denied { map } for pid=20962 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 993.363898] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 993.391523] audit: type=1400 audit(1555924181.358:2967): avc: denied { map } for pid=20962 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 993.549206] audit: type=1400 audit(1555924181.398:2968): avc: denied { map } for pid=20962 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) clone(0xf11f00, 0x0, &(0x7f00000000c0), 0x0, 0x0) 09:09:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000600)={0x2, "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"}, 0xfd1, 0x800) 09:09:42 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_int(r0, 0x0, 0x31, 0x0, &(0x7f0000000040)) 09:09:42 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000280)={0x2, 0x0, 0xb, {0x0, 0x0, 0xa4, 0x6573}}) 09:09:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, "d4ae76fa201c5a88f75ddeb5e2586f15846a830b94aa19c287d7a9edf0c288bddfdd928c6983a5e3774bbe65c124cfaff391c694d77b1208dc3765c3bb2064eb", "1c150d920fae8d25f65e01af3cbd322ef3358a775c5ed5ec538c4ec49c6b5bd5dc4c58592aaaee9274d4ce55ac17ea15ad044b5f15be73789f477bccfa0ee2a2", "ba3da4ba391c1024ceba0eec40bc58a284bcb9f5432e5fa5dd9e4dad1774ede9"}) 09:09:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000600)={0x2, "9935d1bca4683dd81a32cb3fece00caefb67fdec0afe11702633be9beba3ec006fce1375f56ff0009915a16a46645f97cfc4cebf886b70d67faa12b64894918158e761cc555a457586b8f3d4374f05b62cac21051c8e51e50dcbb8bb9d3bd7b277bd75d9a68a3d8bbefe414d80d04fa1722226da8133f48424cbf7ebb81da7be783fc23d2c7e9c33f14206c0437899f944deb9286e79eb5f07a3f6eb12e3a2b2a0fc367f7c183a18b04a9fe303614bcc448684a2deb98f6267650a3d7e65c0a4db99b640cc239dbdb1c9c55d2ea0e7c6ee7b382027381e00e4ad99a45107a12eb2d47b1e6b296ebab36e825d4dd99382b32a8f0ca375a5274fbcf045d7d729c6593d39293ad0c4a55ebd9040efae7edcd5d28260e069c15f26c008e2c262bd0a9daf2856248f6a222d641934d9bc6c9ab224377105ffd98b057da2292f622693524c93aa6f54298b902f2edaf0fec5814ecb8e1ef3718b6b3ab4880915a054bf404c42459a219d1a498e254d6846399f6597691b17a3cb722e3b801fbd188cf10216dacd4fe81de09f6e4ccd7884de2e8309ad58414503839bdaee9693d7f974251b29a27ed1ae7556030a676c7c3bef9554daf95c848ccd5726d88cd780dc90168bfca664f7c61a39a0ba7b9597bb738365ee3ebda652c81e2d3195296c002f2e47997c9d254b79bdc88e7445dc6051b022bdf22cea0c82e2b060bfd84d3073205a5db8e529b7ca90a789c4808c4416ecaef8f26fc97234be658f7116d4c0c6b35f32f322824b52c7426556c1bf0b9703ff4e0239c401406e6f500f6afd55ac29ed6270e5d10a3cf4f73d47b1bdeaf2506adb726250d02967c5268d6e8a335eb720883286304aa59d05f475e9224f50263e384d44ab91c34e082911f15547a86d780d5e8a07a46588d0a6c6841cb05cb5d0d56338c0be9d8bb224956109063715e5d503b287ba8a3b8eae26e6988e252046214630d0b6bc400ebfa8a2442fb2ac0a2d81839a0f4bcb9874595d26214eb23c657dd9587bebe6318b73983c5534b346a31bbc5ada430b25ee750dc266440de86f08f68885521db3b3a157e88e004ee7a1390b6603bccd81936420231a75f9a5fc3c72748b1f2f9ae50729413020b0a3eec5150d8624fe83c2bd12fe9aae41ec805a2b41822fff61e6b65d63eebd6c7e1dba2ba77fb5aef1cd9de8fd8008d6b9f906e68af95af9e53c141fdb8344308a94154326f52fe7f705163cec6608303980689b48907165a5e8b6d8a72decff4e945ddcaecdbe28683d03ce5deffacda5ea125e6493a9e22af9d528aab002a9497b45b7624b4fccba8c1593268b5503a403c9743df2f53fc498c4c73a57ce71638cbb67cdebff4a665c27efdce3944a162545244f0d3e864bb83172ea1823658d0ab566f7391b5a32fe04f8766bd93d609ee560bfdd761ef9bb814c06368b60368aeed9a5fedb56281b201d93d7245428e0febe97345ae3a50e6be4fdb43000f54b6133398fc5bfea167a9ee5b4b4869fe1ac6c68d5a5513019ec2a122dc9f5db691d7f77bb40f88ed52b92beb49ee0297049a5382a61650fb0a5eb1970a1633372df309d54890283a9bca064f270f3287c03dfb55bb49477691ceafcb31a68632da2eae79a57b3cbfca976e43e30eb4e51cd22deee3c2e7877a701230919e73016cfe469a088a02072ab92129d006d84bcdd95878bb214f347faa0c68442758bd68af9bfe290fb333a82e6168a7e0daab0d067f891390874784d7c3785510d5774b04dc9b4950e2c123c4e2246cdf43af043752494c5cd7fc7600dfeae80be1363516c1b4a1905cd1fa11ada2c57d2827cbbbe8f613fe915d1bd654d45842f82a96498cee200f358ff6c92054b676d667325b9af2475f74b5daeb7f41968fa29ba9e0647abe1ca3fa527ae90573bb165e35fa604cad8f4ac2f2c1421bf038681637bb0a8f5f7e3f973d1c9058f6a466070e454bcbc8324e78ad3fed185a214e2ee921065da593857357b1a85aaf407e8bd59e36d179ab899825a0c64a1aaaf09087d75a1939d2dfc1660a5822cdfd2e137fc59dec39a6ddc3491861657cd8a019aff048bb673aa1a0983e707cfb57cf5f372d28a304836e3ea122913038acda1088d7f35b7b9a1457746aa6c3152f6f76ad214e07297c008023ae7fe25f0176f80a7a5c174617f59945b869953b125c2dcd88e5f1089dd9d92e7dc72a99ebb5e3ee489a98faca5463dc09a49e2909a55c8ceb3a60d694bab897156aa29b1f4771bd91df3ca7ea7f54f552522ce56c8990e1b5ee4bdcada85c1f22ee51cb8713c53bc04a4df20010fcd4dbfec46142c677f2213e403d89df26558ce7e35905f92c1a31de3817c6d3b6229b8b2850b42f58e5afae60a2b8951435f8d484ea0d070063dd09fad0f288dc41418c10381d31f52aeb59f03f9acdea1017915238f1344c06899ad67c51d1699d5f679874af6060579b55f404bea1336f4809a223718a998dd596de1e314328d60f66744efd81e6e2a6b6e71e63119ec7969b48518830dc64f3cb56812b732b3944d85fe9374d44d152f31738854c65434210bdbc83cfc4dd69771ef0cbc171f78fd67f0b7496b2fa5dd1ae297211e94baf81f9aefe80f051597683b1b965ee8d7949d781debe5ba91feb2b897fd6f555d54d3a38d692cea7b37a8fdc297fa26dbcd5a3dee3aeef7114c66e4c936d3cd329a05707697d6cb18f0f6e4f6309c5ef75e1ae5a3f6d3b87b53425978c8cbe9191dd21b8034fc9495a1a6c7d56b2f79f2f0e5830006b3cfad419b77a1bc58bad936d8c48903379b0356aa97e7f320b06b06088069f08328142456318cada8ea97a77b1b9b2ce59916df8fb978a2208e51792a8f2920d6037c4a71079a7c968c99c59811f3f8e19be4ccfe0b9fe2477991fb959358f9bb09202dff4fd6efecc43aaba45289950ed351a1e6a51ea35d4a3b3bf1c057be2f6e1f60c8ba26efa72a488c01f1be5851f8aeda94d384dd99643f27297291e653e21af60afffb249898d0d5b98d8f8d6b8c6052721337f192cadcf6a784c84f460578da4731db6029e1024d77f9f84c78d280bbdb128a107494677b7c960bcb5fa57fbefd6030a2ba0eb4a187cbda1a11acd56e1dc0006e17200e3ceb28e3194318f2795f70a25a2d21a7d70c9df53c5970d45221bc79b089a57ac57decf0f08359afe7598335d958787fe93c98e0fcb12746f8a6d39fc70fd1a24a2d865e91bb3f93fde9bb42cae57f1c9ac8cb5f9a2713d41bf8812f2741aba55bc81ae5134b8f5184d0f8b87e8448f2a71e25a79cba23a3cd95c56ded89c2bbb332ee49909a8889b1e1318f32d951cad65d29d901570dc88d41abce597c0720b0d1f0cadcc77b641d4c7b049dca12cdf3ac42f69eada21ecf5f1db72ed72ce555d44d0163da81bc91c6fb67fe45c6ebe8d270c1c49c1c9de9ca53eef27fa2df693e2e42637c1eb09b9e7334a8a42e8c86166c7f1bd1753de7fa19f68e8b92a25219a5b7bfd5a3aa8727b5be70c47574e1e079921003be4f9a7721079d8108ef0214fbd7e4346bbc3a36eaf24c7dbc408036f384c7bc9b4aa6cc50b4d1384fd69acfdf8fb3b42c7a88511f9b6ab129ef7465adbb5a2550e139c5bf277143d770011dc8d1136ad4546f93993d88e21ae17d20521d1dae4ee6fb1bb7ebd82ff04ffb2888152ac5ce47f9ff227215d7216936cfce1a2e29b167186a5ad3afc02bcbf565874ab004d3583994db2864e616cdb9c2c4e9ab78ac486328ec5d4c165c0d6386053cb1a7cdcf1e1f350ca3f311d889a85ee210372c23a236e59ec4488102dda92a2ff033bc7c65a4f043951dc82fe05bfc87935c2af8446e2251cd0ce355b5f9a853d2fdeb6c47e7f63d8e275b685cdfa832234c36f51d9a5ea6513aa16c1c66a9c8d8157b9897cb5282307e845667fb0d4750b7b427984dc0fb66e0e537bd1741bee36c3b5a4706fdf36fe0edf05e66a9faa160899b9848528db38abf65db9d49c6fe7317ca40a968195493ebaf7c9e13052b843e26762b0d4ac62e5de05f6a1142a1765e36407f50914351aed98b930885c7510bc6edcc9eea82e77a6b96bc2d5fd66ebcaf51d4ad24b92fddc593c0c52171c3d8ef50bac403690f8b7195d3a7d7343bc930185be16ae29409042c892da1f6d44a9b64e48c229665aec50b78f2ef7d99c0de04d4c617781613586006822b86fefb49be117249c09c3e7800d125d94e0fc04744c073c01bdfdad702f7ef4600741cbbcb649e2415bb0cb13daae10c0da508c7bc18025dec1826893e8d276e65f4b36562ebb94501d35eee95953d71c36e674fc50c81699f956c6c4e2a965c9059a9235461fc8c7e01823f0a031e68cf440a11c24d07c25228ffa046542f5ac9bcc2b24262b0059b5c83edc47776f7399640785d611d59c8826fdd1652eed8fe3dc00403903322c9932749a96a22bc39f4cc93170c67089babd6efd143788885264ff67410fb1f6790a0dee25c92d98b46184783eaf74ce684f10991e8f1c4868321c54cd047b99ad2e3042cb59f5867c51c449b8656a1fab7cfe594d99320182f00d9485fa776d8a3e208bee850322f5a5635de9a39d72fd669f73ac4bad152fa572370311ebfd778ed3e5d0734a0eece443ada017141182793965a9b8cf2433ac8abfea1b6c7a56e1a033269bd17a12271180a532e4f62ca023e49921cd0cdee67acbee75d4e7583ea2265f67d68597cc5f00a4b9f8ab3da6adf1eb33641b4063927ac21f458fcf3951c06ef1c087045555a7d94e4e1841fb3eae8d1bfc7afeebdd9c61d5c843aadba2cf45711d2443a97080a0183a203b68385b05264c31cc39064dc699a1a935a11b18d1a0a76fb9df1909fdc2a4fb252401c7df661bd5dca6d8e729034be7a43645073a32a923be4ba61449d618a0a49ac6f98353a67aa728b09113971d989742365a2c239698fd5de51adf58360a6b56875c98409c2f6074aa6f0a29da2e7bb48ffcbe29bef0c1c2b707f519c0054e07c1ac78ba92a75396aa81e662407a7c6ec9e0e4c8b0a8b0318cd7fc5b82fddb9c67b0ab49444159d6b2f2a7c9deeeba043020f6e6c6be08e36ac6c31a8792e505aed1a543d7edc76379154a86fb545c08ba789ffbf43e7bdcdf640ae7fe070227cd3aa2e5d82fd23abb84537d9e6b5e20d498026428335163d83e54786fb19a71908568bb3a12bed5dec6a068d02a486f68e89cebb340827d453b2e42cec4393fb5706bd75d332be4f33f350e1c5ac36400494f4ee9a549e43caef90eafc41ea217aa3627b29cffce8bef277bf2a1d329255d9bbf1745b7605a31678420c845f64f4a91a4abe90dfcb5262a814ebf146944bd25c5d95080e4fcd91e7ef8427d9c5dae7bca722732de17740c60b36d337e5a8d067e410ef917e062f75081ebe76ac8177a26ca3398bdd612c263c90d2bfc185635ae7c39f6cd24ac96354cdc555977dc7ca40be6537b2a6dd8af07ff11c8eb8f44ef52c4d20b01192c6ea87dcd956e54316f2037daf68cc97f775244f8b25ae3d6746ffa46e3cb50b74863cb1b72156db9cf610729dc3fc6b4396fc7f04ca7effd4f30d1df1dd6837099141dc0e651441bf10703a414f8174a63d28e0d8b0024723c5e5198718cdc8d83265e45f2028d654bb9d88127709e74b1525aafb1616d1b434bf646704f3bf761ac3e1a1b842a83e7e0d38ebdbe20db093d566"}, 0xfd1, 0x800) 09:09:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r3 = socket(0x11, 0x80002, 0x0) ioctl$RTC_VL_CLR(r2, 0x7014) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:09:43 executing program 2: r0 = socket$inet6(0xa, 0x82000000003, 0x810000000000010) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f0000000140)=@ethtool_cmd={0xa, 0x0, 0x300}}) 09:09:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="baa000edf26df20f080347640f0058d5640f320f381dec0f221b8d4e9c66b80500000066b94a7b00000f01c1", 0x2c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x12, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000140)={0x2}, 0x1) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000180)='security.evm\x00', 0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:09:43 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/100, 0x64) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)=0xfffffffffffffffe) close(r0) 09:09:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000600)={0x2, "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"}, 0xfd1, 0x800) 09:09:44 executing program 2: r0 = socket$inet6(0xa, 0x82000000003, 0x810000000000010) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f0000000140)=@ethtool_cmd={0xa, 0x0, 0x300}}) 09:09:44 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000040)={0xc, 0x4f424752, 0x140, 0xb4, 0x0, @stepwise}) [ 996.277732] net_ratelimit: 18 callbacks suppressed [ 996.277740] protocol 88fb is buggy, dev hsr_slave_0 [ 996.288175] protocol 88fb is buggy, dev hsr_slave_1 [ 996.293444] protocol 88fb is buggy, dev hsr_slave_0 [ 996.298674] protocol 88fb is buggy, dev hsr_slave_1 09:09:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f000000e240)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) readv(r2, &(0x7f00000007c0)=[{&(0x7f00000001c0)=""/104, 0x34910}], 0x1) 09:09:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:09:45 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x5411, &(0x7f0000000080)) 09:09:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000600)={0x2, "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"}, 0xfd1, 0x800) 09:09:45 executing program 2: r0 = socket$inet6(0xa, 0x82000000003, 0x810000000000010) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f0000000140)=@ethtool_cmd={0xa, 0x0, 0x300}}) 09:09:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x3, 0x800008800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x6}, 0x2c) getsockopt$inet_mreqsrc(r1, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x2c) [ 997.077748] protocol 88fb is buggy, dev hsr_slave_0 [ 997.082888] protocol 88fb is buggy, dev hsr_slave_1 [ 997.088200] protocol 88fb is buggy, dev hsr_slave_0 [ 997.093299] protocol 88fb is buggy, dev hsr_slave_1 [ 997.223727] kauditd_printk_skb: 68 callbacks suppressed [ 997.223741] audit: type=1400 audit(1555924185.758:3037): avc: denied { map } for pid=22155 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 997.410468] protocol 88fb is buggy, dev hsr_slave_0 [ 997.419548] protocol 88fb is buggy, dev hsr_slave_1 [ 997.483426] audit: type=1400 audit(1555924185.768:3038): avc: denied { map } for pid=22153 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:46 executing program 2: r0 = socket$inet6(0xa, 0x82000000003, 0x810000000000010) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f0000000140)=@ethtool_cmd={0xa, 0x0, 0x300}}) [ 997.720013] audit: type=1400 audit(1555924185.768:3039): avc: denied { map } for pid=22153 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:46 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86be9084baa5b5db07000000680000010000000000"], 0x2b) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) read$rfkill(r1, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, &(0x7f0000000140)) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) 09:09:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) socketpair(0xd, 0xa, 0x654000000000, &(0x7f0000000080)) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 997.891883] audit: type=1400 audit(1555924185.788:3040): avc: denied { map } for pid=22155 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 998.031873] audit: type=1400 audit(1555924185.798:3041): avc: denied { map } for pid=22155 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:46 executing program 4: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) r2 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) 09:09:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) [ 998.192917] audit: type=1400 audit(1555924185.838:3042): avc: denied { map } for pid=22153 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 998.328992] audit: type=1400 audit(1555924185.838:3043): avc: denied { map } for pid=22153 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 998.468704] audit: type=1400 audit(1555924185.848:3044): avc: denied { map } for pid=22161 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 998.577417] audit: type=1400 audit(1555924185.868:3045): avc: denied { map } for pid=22155 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 998.715540] audit: type=1400 audit(1555924185.888:3046): avc: denied { map } for pid=22161 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:47 executing program 1: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) close(r1) 09:09:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1d, 0x0, 0xffffffffffffffff}}, 0x50) [ 999.120694] block nbd0: shutting down sockets 09:09:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_TID_ADDRESS(0x2a, 0x0) 09:09:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") recvmmsg(r0, &(0x7f0000004140)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/150, 0x96}, {&(0x7f00000002c0)=""/191, 0xbf}, {&(0x7f0000000380)=""/247, 0xf7}, {&(0x7f00000004c0)=""/226, 0xe2}, {&(0x7f0000000180)}], 0x5, &(0x7f0000000640)=""/14, 0xe}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000680)=""/240, 0xf0}, {&(0x7f0000000780)=""/132, 0x84}], 0x2, &(0x7f0000000880)=""/181, 0xb5}, 0x7fffffff}, {{&(0x7f0000000940)=@alg, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/128, 0x80}, {&(0x7f0000000a40)=""/193, 0xc1}, {&(0x7f0000000b40)=""/221, 0xdd}, {&(0x7f0000001040)=""/4096, 0x1000}], 0x4, &(0x7f0000000c80)=""/76, 0x4c}}, {{&(0x7f0000000d00)=@l2, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d80)=""/182, 0xb6}], 0x1, &(0x7f0000000e80)=""/231, 0xe7}, 0x8}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000002040)=""/209, 0xd1}], 0x1, &(0x7f0000002140)=""/4096, 0x1000}, 0x81}, {{&(0x7f0000003140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x80, &(0x7f00000031c0)=[{&(0x7f0000000fc0)=""/18, 0x12}], 0x1, &(0x7f0000003200)=""/165, 0xa5}, 0x6}, {{&(0x7f00000032c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000003500)=[{&(0x7f0000003340)=""/203, 0xcb}, {&(0x7f0000003440)=""/143, 0x8f}], 0x2, &(0x7f0000003540)}, 0x6}, {{&(0x7f0000003580)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000003700)=[{&(0x7f0000003600)}, {&(0x7f0000003640)=""/163, 0xa3}], 0x2}}, {{&(0x7f0000003740)=@rc, 0x80, &(0x7f0000003b00)=[{&(0x7f00000037c0)=""/214, 0xd6}, {&(0x7f00000038c0)=""/82, 0x52}, {&(0x7f0000003940)=""/177, 0xb1}, {&(0x7f0000003a00)=""/34, 0x22}, {&(0x7f0000003a40)=""/126, 0x7e}, {&(0x7f0000003ac0)=""/60, 0x3c}], 0x6, &(0x7f0000003b80)=""/32, 0x20}, 0x284c}, {{&(0x7f0000003bc0)=@isdn, 0x80, &(0x7f0000004000)=[{&(0x7f0000003c40)=""/241, 0xf1}, {&(0x7f0000003d40)=""/170, 0xaa}, {&(0x7f0000003e00)=""/45, 0x2d}, {&(0x7f0000003e40)=""/181, 0xb5}, {&(0x7f0000003f00)=""/225, 0xe1}], 0x5, &(0x7f0000004080)=""/148, 0x94}, 0x7f}], 0xa, 0x12000, &(0x7f00000043c0)={0x0, 0x989680}) getresuid(&(0x7f0000004400), &(0x7f0000004440), &(0x7f0000004480)=0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000044c0)={{{@in=@broadcast, @in6=@rand_addr="ef5b790e2ac28afff0f3f6629e8c13cf", 0x4e23, 0x8, 0x4e21, 0x0, 0x2, 0xa0, 0x80, 0x33, r1, r2}, {0xfffffffffffffffc, 0x2, 0x3ff, 0x5, 0x401, 0x7fff, 0x9, 0x3}, {0x6, 0xcf22, 0xffffffffffff3585, 0x4}, 0xffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, {{@in=@rand_addr=0x1, 0x4d5, 0x7e}, 0x2, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x6, 0x0, 0x5, 0xffffffff, 0x5, 0x1}}, 0xe8) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r4 = socket(0x11, 0x80002, 0x0) bind$packet(r4, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) r5 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8, 0x101000) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x20000, 0x0) ioctl$KVM_IOEVENTFD(r5, 0x4040ae79, &(0x7f0000000140)={0x1000, &(0x7f00000000c0), 0x4, r6, 0x8}) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r3, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:09:48 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @empty, @link_local, @local}}}}, 0x0) 09:09:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000140)='\n', 0x1, 0xfffffffffffffffd) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00'}}) [ 1000.010256] block nbd0: shutting down sockets 09:09:49 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000018007fafb72d1cb2a2a280930206000000a84309c026230004000800040000001000ca8a9848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:09:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x8, 0x1000100, 0x400}, 0x10) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:09:49 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85513, &(0x7f0000000100)={{0x2}, 0x0, [0x2]}) 09:09:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0xc018620b, 0x70c000) 09:09:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$rxrpc(0x21, 0x2, 0x2000000000000a) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000700)='scalable\x00', 0x9) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYRES32=r1], 0x100000530) 09:09:49 executing program 0: madvise(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") inotify_add_watch(0xffffffffffffffff, &(0x7f0000ac5000)='./file0\x00', 0x0) madvise(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x2) 09:09:50 executing program 4: capset(&(0x7f0000594ff8)={0x19980330}, &(0x7f0000244000)) r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f000001d000)=@ipv6_newroute={0x1c, 0x18, 0x501}, 0x1c}}, 0x0) 09:09:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='numa_maps\x00') shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) readv(r1, &(0x7f0000000000)=[{&(0x7f0000242000)=""/2560, 0xa00}], 0x1) [ 1001.557759] net_ratelimit: 22 callbacks suppressed [ 1001.557769] protocol 88fb is buggy, dev hsr_slave_0 [ 1001.567902] protocol 88fb is buggy, dev hsr_slave_1 [ 1001.797734] protocol 88fb is buggy, dev hsr_slave_0 [ 1001.802962] protocol 88fb is buggy, dev hsr_slave_1 09:09:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x3) 09:09:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000540)=0x3f, 0xffffffffffffff73) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000200)="fceb9c42ea1dcb14045888af619c14bcc4986147161da4d7809ed79c66b549a4a1a58a0bab2cb3b06bcffe8ea25f85f1a58ca8f3042f3870023a6a5847bb8d944520d63bb8f2d7ff7b1c10f487faadb39735cf4136bc0a4590e829dc8efc9adb530e4db9e239dc2d8638292be034677bfe26ec84c5d43c0e77d526316b6a3da89a4b268fb70f89eef4ee0671a9fa942cd6860e679a552c0b78a99238e953ca1acd6fdd95a4379e0693488a38e87defe2ddccd41e9c213327d1", 0xb9, 0xfffffffffffffffc) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x101000, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={r3, 0x5, 0x6}, &(0x7f00000002c0)={'enc=', 'pkcs1', ' hash=', {'sha3-384\x00'}}, &(0x7f0000000340)="59cda35d0320598d895e16c61503808e03e6c7b5c4f9b560001b1b638c402e3c2fc207e6809c2e5e8cb303fe535606d18cf82f0606a66a663c1d2d61c5109d560aa85455b608b9727a06c6c1993681c1217f12a8c934ee11f2c8447c2b0de2607dec885dbef56985adfea5fa4128e8581d2996fd6f370257c2712e0cc5dfd098d1b033da9db17e83384c2392d2cdbf02b69a6e788e2956f90dadd086a48b595cb98c1b0f19ece27d9d0a9d8c30fc0ce1a8e71edfff33a7f2fba3230fea0a2179818d2643d8c3f6b17a", &(0x7f0000000180)="d394b9f5a6f58892") connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1002.258537] kauditd_printk_skb: 107 callbacks suppressed [ 1002.258561] audit: type=1400 audit(1555924190.798:3154): avc: denied { map } for pid=23472 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.374613] audit: type=1400 audit(1555924190.838:3155): avc: denied { map } for pid=23472 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$kcm(0x29, 0x805, 0x0) sendfile(r2, r1, 0x0, 0x63) [ 1002.499838] audit: type=1400 audit(1555924190.878:3156): avc: denied { map } for pid=23472 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.517792] protocol 88fb is buggy, dev hsr_slave_0 [ 1002.529180] protocol 88fb is buggy, dev hsr_slave_1 [ 1002.534486] protocol 88fb is buggy, dev hsr_slave_0 [ 1002.539762] protocol 88fb is buggy, dev hsr_slave_1 [ 1002.554521] audit: type=1400 audit(1555924190.878:3157): avc: denied { map } for pid=23472 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:51 executing program 0: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) socket(0x1a, 0x0, 0x0) 09:09:51 executing program 2: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000001040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = gettid() getrandom(&(0x7f0000000b00)=""/4096, 0x1000, 0x2) tkill(r0, 0x13) [ 1002.758278] audit: type=1400 audit(1555924190.948:3158): avc: denied { map } for pid=23472 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1002.879270] audit: type=1400 audit(1555924190.948:3159): avc: denied { map } for pid=23472 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.037825] audit: type=1400 audit(1555924191.358:3160): avc: denied { map } for pid=23995 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:51 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmc(0x0, 0x9, 0x0) syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) lsetxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='security.evm\x00', 0x0, 0x0, 0x1) r1 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) ioctl(r0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000008c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000880)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000a40)={'team0\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9e50) r2 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac1414e0}]}, &(0x7f0000000080)=0x10) socket$inet(0x10, 0x2, 0x0) [ 1003.160462] audit: type=1400 audit(1555924191.398:3161): avc: denied { map } for pid=23995 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.267791] audit: type=1400 audit(1555924191.398:3162): avc: denied { map } for pid=23995 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1003.317794] protocol 88fb is buggy, dev hsr_slave_0 [ 1003.322993] protocol 88fb is buggy, dev hsr_slave_1 [ 1003.393611] audit: type=1400 audit(1555924191.468:3163): avc: denied { map } for pid=23995 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:52 executing program 2: mknod(&(0x7f0000000040)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r2, 0x0, r0, 0x0, 0xffffffff, 0x0) 09:09:52 executing program 1: mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) 09:09:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2, 0x4, 0x100000000209e1d, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x600, [0x4000]}, 0x2c) 09:09:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000100)=@v2={0x3, 0x2}, 0x4, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 09:09:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000080)={@remote, @multicast1}, &(0x7f00000000c0)=0x8) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:09:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000600)=@newlink={0x3c, 0x10, 0x511, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x8}]}}}]}, 0x3c}}, 0x0) 09:09:53 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xbd}], 0x30}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000001180)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000200)=""/15, 0xf}, {&(0x7f00000002c0)=""/172, 0xac}, {&(0x7f0000000440)=""/234, 0xfffffdcd}], 0x3, &(0x7f00000006c0)=""/147, 0x93}}], 0x1, 0x0, &(0x7f00000012c0)) 09:09:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100), 0x4) syz_init_net_socket$ax25(0x3, 0x0, 0xcf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x4e23, 0x9, @local, 0x20}, {0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}, 0x3, [0x0, 0x9, 0x2, 0x0, 0x522, 0x1, 0x9, 0x8]}, 0x5c) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204006902000270f7f8", 0x16}], 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000300)={0x28, 0x2, 0x0, {0x0, 0x5}}, 0x28) semget(0x3, 0x0, 0x90) syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x3, 0x2) umount2(&(0x7f0000000400)='./file0\x00', 0x4) 09:09:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0xffffffffffffff7b) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x10000, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f00000000c0)) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:09:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)={0x14, 0x3e, 0x105, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 09:09:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getdents(0xffffffffffffffff, 0xfffffffffffffffd, 0xffffff8d) [ 1006.071793] netlink: 'syz-executor.2': attribute type 9 has an invalid length. 09:09:54 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x4003, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x0, 0x3, 0x0, "94be8e16a1cf2ddb99ba7224d6c78bc35b5166854726d8366af5163819938d82"}) [ 1006.677739] net_ratelimit: 18 callbacks suppressed [ 1006.677749] protocol 88fb is buggy, dev hsr_slave_0 [ 1006.688869] protocol 88fb is buggy, dev hsr_slave_1 [ 1006.694139] protocol 88fb is buggy, dev hsr_slave_0 [ 1006.699415] protocol 88fb is buggy, dev hsr_slave_1 09:09:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000240)={0x2, 0x0, [{0x1}, {0x80000008, 0xffb}]}) 09:09:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 09:09:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x9, 0x3ff, 0x10000000000006, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x7, 0x2, &(0x7f0000000080)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f0000000140)='GPL\x00', 0x80000001, 0xe9, &(0x7f00000002c0)=""/233}, 0x48) [ 1007.477750] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.482923] protocol 88fb is buggy, dev hsr_slave_1 [ 1007.488157] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.493247] protocol 88fb is buggy, dev hsr_slave_1 09:09:56 executing program 5: accept(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) r0 = socket(0x22, 0x2, 0x40000000000004) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000000)) 09:09:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1000, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000200)={{0x5, 0x6, 0x3, 0x7, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', 0x92}, 0x6, 0x240, 0x0, r3, 0x5, 0x100000001, 'syz0\x00', &(0x7f0000000140)=['\x00', '&\x00', 'trustedlo}vmnet1keyring+wlan0\x00', '\x00', ')\x00'], 0x24, [], [0x7, 0x6, 0x5, 0x98ab]}) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r4 = socket(0x11, 0x80002, 0x7da2) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0305710, &(0x7f0000000180)={0x0, 0x7, 0x1}) bind$packet(r4, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r4, 0x106, 0x5, &(0x7f0000001000), 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000340)={0x0, {{0xa, 0x4e24, 0x8, @loopback, 0x26d}}, {{0xa, 0x4e21, 0x101, @ipv4, 0xffff}}}, 0x108) 09:09:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x7, 0x7f, 0xa5, &(0x7f00000002c0)="e3e0d065ec607f48a097e825e5c3f29cd804a7a355290fec9f118ad726f0b5d13e67b4bf63a601e7e2b6b6f26ed385a256336526c8aedecffe725145a55485e6d002595e562ccbba34f811079faf63b81801bcc7bd9b2ce4886ae8ae7d99ac0df371f1f9dae674767bb690dfa20afa34ed5e30c4b36254d1aa1d23eceff795048837d00a0ff90ea4a517668328fd1f40c7b51eaa1188572be21a659c27b72e8a604192ef54"}) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x1) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204006902000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 1007.797743] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.802893] protocol 88fb is buggy, dev hsr_slave_1 [ 1008.026867] kauditd_printk_skb: 87 callbacks suppressed [ 1008.026882] audit: type=1400 audit(1555924196.558:3251): avc: denied { map } for pid=25713 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1008.161026] audit: type=1400 audit(1555924196.618:3252): avc: denied { map } for pid=25713 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1008.293058] audit: type=1400 audit(1555924196.648:3253): avc: denied { map } for pid=25713 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1008.440761] audit: type=1400 audit(1555924196.658:3254): avc: denied { map } for pid=25713 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f1200123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = dup2(r1, r0) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000080)) dup2(r1, r0) r3 = socket(0x11, 0x80002, 0x0) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:09:57 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = dup2(r0, r0) getpeername$netrom(r1, 0x0, 0x0) [ 1008.644790] audit: type=1400 audit(1555924196.678:3255): avc: denied { map_create } for pid=25718 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1008.793578] audit: type=1400 audit(1555924196.698:3256): avc: denied { map_read map_write } for pid=25718 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1008.942570] audit: type=1400 audit(1555924196.718:3257): avc: denied { prog_load } for pid=25718 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 09:09:57 executing program 0: removexattr(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x20000002812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1009.092623] audit: type=1400 audit(1555924196.738:3258): avc: denied { map } for pid=25713 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:57 executing program 4: socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 1009.250478] audit: type=1400 audit(1555924196.758:3259): avc: denied { map_create } for pid=25718 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1009.376667] audit: type=1400 audit(1555924196.788:3261): avc: denied { map } for pid=25713 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:09:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8927, &(0x7f0000000180)={'team0\x00'}) close(r2) close(r1) 09:09:58 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x541f, 0xfffffffffffffffd) 09:09:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x204, &(0x7f0000000380)="0affefe723facb228bcf05a500965f6cbcfc82060000ecf71f337ee0f705c741e3ec") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x200, 0x0) write$apparmor_exec(r2, &(0x7f0000000180)={'exec ', '\x00'}, 0x6) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x11, 0x80002, 0x0) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) listen(r3, 0x100) r4 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='md5sumuser{!-\x00', 0x0) keyctl$describe(0x6, r4, &(0x7f0000001040)=""/4096, 0x1000) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:09:58 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$ashmem(0xffffffffffffff9c, 0x0, 0x8040, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r0, 0x0, 0xfffffebb) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) open(&(0x7f0000000280)='./file0/file0\x00', 0x10000, 0x90) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r2 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x10000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000240)={0x100000000, 0x2, 0x9, 0x8, 0x8}, 0x14) r3 = dup2(r1, r1) sendmsg$alg(r3, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec2903", 0x5}], 0x1}, 0x8005) write$P9_RATTACH(r3, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x0) 09:09:59 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) 09:09:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x401, 0xfffbffffffffffff}) 09:09:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa00, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) read(r0, 0x0, 0x0) 09:10:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/uts\x00') setns(r1, 0x4000000) 09:10:00 executing program 1: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) [ 1011.957817] net_ratelimit: 22 callbacks suppressed [ 1011.957827] protocol 88fb is buggy, dev hsr_slave_0 [ 1011.967987] protocol 88fb is buggy, dev hsr_slave_1 09:10:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) getpeername(r0, &(0x7f0000000080)=@can={0x1d, 0x0}, &(0x7f0000000100)=0x80) bind$packet(r2, &(0x7f0000000140)={0x11, 0x6, r3, 0x1, 0xffffffffffffffff, 0x6, @random="55be1917c485"}, 0xfffffffffffffffe) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1012.197765] protocol 88fb is buggy, dev hsr_slave_0 [ 1012.203043] protocol 88fb is buggy, dev hsr_slave_1 09:10:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") recvmmsg(r0, &(0x7f0000005280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write(r0, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x14, 0x29, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 09:10:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f0000000240)=0x1, 0x4) [ 1012.751889] attempt to access beyond end of device [ 1012.804896] loop1: rw=4096, want=136, limit=2 [ 1012.836303] gfs2: error 10 reading superblock [ 1012.918280] protocol 88fb is buggy, dev hsr_slave_0 [ 1012.923783] protocol 88fb is buggy, dev hsr_slave_1 [ 1012.931197] protocol 88fb is buggy, dev hsr_slave_0 [ 1012.936501] protocol 88fb is buggy, dev hsr_slave_1 [ 1013.068051] kauditd_printk_skb: 89 callbacks suppressed [ 1013.068068] audit: type=1400 audit(1555924201.608:3350): avc: denied { map } for pid=27242 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd000000100001000c081000414900000004fcff", 0x58}], 0x1) 09:10:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00', {}, 0x40}, 0x45c) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 1013.234031] audit: type=1400 audit(1555924201.648:3351): avc: denied { map } for pid=27242 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)="ff0000000000009b800081002563", 0xe}], 0x1}, 0x0) [ 1013.409296] audit: type=1400 audit(1555924201.708:3352): avc: denied { map } for pid=27242 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000080)=""/36) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:02 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="f3e133def9575cb7d991d6734e4e73226a0a096cccbaf2f2e60e50e94d00c9c966440f3808218d8d294ad0d26c0f4507bf420fae9972b571b99f01467785fb") [ 1013.579426] audit: type=1400 audit(1555924201.728:3353): avc: denied { map } for pid=27242 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1013.698474] audit: type=1400 audit(1555924201.798:3354): avc: denied { map } for pid=27242 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1013.723024] protocol 88fb is buggy, dev hsr_slave_0 [ 1013.723083] protocol 88fb is buggy, dev hsr_slave_1 [ 1013.917843] audit: type=1400 audit(1555924201.808:3355): avc: denied { map } for pid=27242 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1013.980034] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1014.055439] audit: type=1400 audit(1555924201.978:3356): avc: denied { create } for pid=27290 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1014.095011] input: syz0 as /devices/virtual/input/input65 09:10:02 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x127d, 0x0) [ 1014.250541] audit: type=1400 audit(1555924202.528:3357): avc: denied { map } for pid=27401 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:02 executing program 5: keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x0}) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001b40)='t\bnu\x00\x00\x00\x7f\x00\x00\x8c\x00\x10\x00\x00\x00\x00\x00\x00N\x1c\xc3\xfe\xc3.\x12\x1e\xcc\xf2\xd8\xd5l\x04~K8\xff\xe1S\xfa\xc1\xbb\x8bx\x9e\v\x83\xf6\xb2q[\xfd\xd8\x8b\x1d7\xcc\xe9\x82\xe8Y\xda\xec\x02sh5\x8d\x90J\xd0v\tu@\x13\x94\xd3\xe2\x8d\xec\x914\xcaKy\xe9K\x9cP\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa1\xff\x96\xec\xf8\xcaJH\xef\xfc\n.}\x0fnvI\x83\xa5\xfc\xd3\xe4(\xa7&\xab\xd2\xd5\x90\x87\xea\xddO\x1f\xff\x00\x00\x00\xdd\xb1\xc6\xae\x0f\xb6\xfcEq\xc3\xe6p\x95\xc7x\x91\x9c\xf4\x10W\xfd\xea\xb3|\xa1\xb0M\x06C\xf1\xb5\xc3\x8a\xaf\x1b\x98\xc9c6\x13\xa6\x94\x14', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) [ 1014.426974] audit: type=1400 audit(1555924202.528:3358): avc: denied { map } for pid=27401 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1014.566645] audit: type=1400 audit(1555924202.548:3359): avc: denied { map } for pid=27401 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00', {}, 0x40}, 0x45c) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 09:10:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000100), 0x4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) fcntl$setstatus(r2, 0x4, 0x42803) 09:10:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r3, 0x80}, &(0x7f0000000140)=0x8) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1f}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01dfdde80f32d9e90f086665676426f7c5000000000f2245deef0f23f5", 0x23}], 0xaaaaaaaaaaaae88, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x87, &(0x7f0000000080)='/dev/kvm\x00'}, 0x79) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:10:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000400)={0x0, 0x0, 0x102, 0x4, {0xfffffffffffff801, 0x40, 0x8000, 0x1}}) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000000)=0xfffffffeffffffff, 0x4) bind$inet6(r0, &(0x7f0000710fe4)={0xa, 0x4e21}, 0x1c) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000b46ff0)={0x2, 0x4e21, @broadcast}, 0x10) syz_emit_ethernet(0x2a, &(0x7f000037c000)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r4, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r4, 0x0) [ 1015.847998] input: syz0 as /devices/virtual/input/input67 09:10:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0xfffffffffffffe71) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) r3 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000000c0)={0x40000000}) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00', {}, 0x40}, 0x45c) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 09:10:04 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000180)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x864}}) [ 1017.077739] net_ratelimit: 18 callbacks suppressed [ 1017.077749] protocol 88fb is buggy, dev hsr_slave_0 [ 1017.090325] protocol 88fb is buggy, dev hsr_slave_1 [ 1017.095998] protocol 88fb is buggy, dev hsr_slave_0 [ 1017.101540] protocol 88fb is buggy, dev hsr_slave_1 09:10:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000a3bff8)={&(0x7f0000e69fb8)=@ipmr_newroute={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}}, 0x1c}}, 0x0) [ 1017.251176] input: syz0 as /devices/virtual/input/input68 09:10:06 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00', {}, 0x40}, 0x45c) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 09:10:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1017.877745] protocol 88fb is buggy, dev hsr_slave_0 [ 1017.883137] protocol 88fb is buggy, dev hsr_slave_1 [ 1017.890204] protocol 88fb is buggy, dev hsr_slave_0 [ 1017.896772] protocol 88fb is buggy, dev hsr_slave_1 09:10:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x1bae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) 09:10:06 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1, 0x0, 0x164}}], 0x33b, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x368, 0x0) [ 1018.111450] kauditd_printk_skb: 98 callbacks suppressed [ 1018.111466] audit: type=1400 audit(1555924206.648:3458): avc: denied { map } for pid=28304 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1018.197770] protocol 88fb is buggy, dev hsr_slave_0 [ 1018.204388] protocol 88fb is buggy, dev hsr_slave_1 [ 1018.313871] audit: type=1400 audit(1555924206.768:3459): avc: denied { map } for pid=28304 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) write$P9_RGETATTR(r2, &(0x7f00000002c0)={0xa0, 0x19, 0x1, {0x1908, {0xc, 0x2, 0x4}, 0x10, r4, r5, 0x9, 0x96, 0x2, 0x6, 0xffff, 0x401, 0x40, 0x100000000, 0x0, 0xfffffffffffffffd, 0x1, 0xff, 0xb1, 0x0, 0x4}}, 0xa0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, r3, 0x1, 0x1000, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r6, &(0x7f00000003c0)={0xf, 0x1f, 0x2, 0x1}, 0xf) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1018.475206] audit: type=1400 audit(1555924206.768:3460): avc: denied { map } for pid=28304 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000100)=@routing={0x0, 0x0, 0x2}, 0x8) [ 1018.765493] input: syz0 as /devices/virtual/input/input69 [ 1018.861852] audit: type=1400 audit(1555924207.398:3461): avc: denied { map } for pid=28394 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1018.979644] audit: type=1400 audit(1555924207.408:3462): avc: denied { map } for pid=28394 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1019.179539] audit: type=1400 audit(1555924207.448:3463): avc: denied { map } for pid=28394 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:07 executing program 1: r0 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = accept(r0, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={0x0}}, 0x0) recvmmsg(r1, &(0x7f0000000100), 0x41f, 0x8000040, 0x0) [ 1019.410820] audit: type=1400 audit(1555924207.468:3464): avc: denied { map } for pid=28394 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1019.625627] audit: type=1400 audit(1555924207.538:3465): avc: denied { map } for pid=28394 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1019.826662] audit: type=1400 audit(1555924207.568:3466): avc: denied { map } for pid=28405 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0x7, 0x100000000, 0x9}, &(0x7f0000000200)=0x10) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xc4, 0x4) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'team0\x00'}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@mcast2, 0x2}) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000300)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r0, 0x0) unshare(0x40000000) 09:10:08 executing program 4: ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket(0x200000000000011, 0x3, 0x0) inotify_init() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$rds(r1, &(0x7f0000001fc0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000180)=""/149, 0x95}, {&(0x7f0000000000)=""/22, 0x16}, {&(0x7f0000000240)=""/248, 0xf8}, {&(0x7f0000000340)=""/241, 0xf1}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000440)=""/5, 0x5}, {&(0x7f0000001540)=""/154, 0x9a}, {&(0x7f0000000480)=""/101, 0x65}], 0x9, &(0x7f0000001d40)=[@cswp={0x58, 0x114, 0x7, {{0x0, 0x5}, &(0x7f00000016c0)=0x9, &(0x7f0000001700)=0xffffffffffff0001, 0x3, 0x1000, 0x400, 0x9, 0x4, 0x8}}, @rdma_dest={0x18, 0x114, 0x2, {0x10001, 0xd0}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x400}, @fadd={0x58, 0x114, 0x6, {{0xffff, 0x7}, &(0x7f0000001740)=0x4, &(0x7f0000001780)=0x400, 0x4, 0x8, 0x9, 0x100000000, 0x8, 0x5}}, @mask_cswp={0x58, 0x114, 0x9, {{0x100, 0x1}, &(0x7f00000017c0)=0xd, &(0x7f0000001800)=0x2, 0x400, 0x7, 0x4, 0x3, 0x61, 0x5}}, @mask_fadd={0x58, 0x114, 0x8, {{0x6, 0xff}, &(0x7f0000001840)=0x6, &(0x7f0000001880)=0x80000000, 0x7f, 0x3, 0x8, 0xf69, 0x8, 0x3}}, @rdma_args={0x48, 0x114, 0x1, {{0x8cc9, 0x6877}, {&(0x7f00000018c0)=""/19, 0x13}, &(0x7f00000019c0)=[{&(0x7f0000001900)=""/81, 0x51}, {&(0x7f0000001980)=""/60, 0x3c}], 0x2, 0x40, 0x1}}, @mask_cswp={0x58, 0x114, 0x9, {{0x5, 0x101}, &(0x7f0000001a00)=0x1, &(0x7f0000001a40)=0xab, 0x3, 0x5, 0x6, 0xfffffffffffff001, 0x10, 0x9}}, @rdma_args={0x48, 0x114, 0x1, {{0x400, 0x9}, {&(0x7f0000001a80)=""/16, 0x10}, &(0x7f0000001d00)=[{&(0x7f0000001ac0)=""/229, 0xe5}, {&(0x7f0000001bc0)=""/147, 0x93}, {&(0x7f0000001c80)}, {&(0x7f0000001cc0)=""/51, 0x33}], 0x4, 0x21, 0x1ff}}], 0x278, 0x4000}, 0x4004) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, 0x0, 0x0) dup2(r3, r2) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00\x00\xd6\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'sit0\x00\x00\xff\xff\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) 09:10:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x4, 0x80002, 0x8000) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$PPPIOCDISCONN(r1, 0x7439) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x100, 0x20000) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f00000000c0)=""/57) sendmmsg(r2, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1019.980835] audit: type=1400 audit(1555924207.578:3467): avc: denied { map } for pid=28405 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 09:10:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001000)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)=0x7) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:10:09 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 09:10:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x666d) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) sendfile(r0, r2, 0x0, 0xa198) 09:10:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000080)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x10000, 0x4, 0x100, 0x400}, 0x10) r2 = socket(0x11, 0x80002, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f0000000140)='syz0\x00') bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @dev={[], 0x1f}}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:10 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a", 0x2}], 0x1}, 0x0) 09:10:10 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$RTC_ALM_READ(r0, 0x8008700b, 0x0) 09:10:10 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x541b, 0x0) [ 1022.357783] net_ratelimit: 22 callbacks suppressed [ 1022.357792] protocol 88fb is buggy, dev hsr_slave_0 [ 1022.367953] protocol 88fb is buggy, dev hsr_slave_1 [ 1022.597738] protocol 88fb is buggy, dev hsr_slave_0 [ 1022.603011] protocol 88fb is buggy, dev hsr_slave_1 09:10:11 executing program 1: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_security(0x11, r0, &(0x7f0000001340)=""/101, 0x65) 09:10:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r3 = dup3(r0, r1, 0x80000) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000200)={0x2, 0x1, 0x9, 0x7f, 0x1000, 0x212b}) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000080)={0x7fff, {{0x2, 0x4e21, @local}}, 0x0, 0x1, [{{0x2, 0x4e22, @empty}}]}, 0x110) [ 1023.317731] protocol 88fb is buggy, dev hsr_slave_0 [ 1023.322950] protocol 88fb is buggy, dev hsr_slave_1 [ 1023.328294] protocol 88fb is buggy, dev hsr_slave_0 [ 1023.333488] protocol 88fb is buggy, dev hsr_slave_1 09:10:11 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) wait4(0x0, 0x0, 0x40000001, &(0x7f0000000580)) [ 1023.394177] kauditd_printk_skb: 88 callbacks suppressed [ 1023.394203] audit: type=1400 audit(1555924211.928:3556): avc: denied { map } for pid=29915 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast2}}]}, 0x110) [ 1023.627738] audit: type=1400 audit(1555924211.988:3557): avc: denied { map } for pid=29915 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:12 executing program 4: syslog(0x2, 0x0, 0x0) [ 1023.760515] audit: type=1400 audit(1555924211.998:3558): avc: denied { map } for pid=29915 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000440)=@getlink={0x20, 0x12, 0x1}, 0x20}}, 0x0) [ 1023.918794] audit: type=1400 audit(1555924211.998:3559): avc: denied { map } for pid=29915 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1024.094600] audit: type=1400 audit(1555924212.068:3560): avc: denied { map } for pid=29915 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1024.117757] protocol 88fb is buggy, dev hsr_slave_0 [ 1024.122866] protocol 88fb is buggy, dev hsr_slave_1 [ 1024.267792] audit: type=1400 audit(1555924212.118:3561): avc: denied { map } for pid=29915 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1024.371324] audit: type=1400 audit(1555924212.118:3562): avc: denied { map } for pid=29915 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1024.496489] audit: type=1400 audit(1555924212.158:3563): avc: denied { map } for pid=29915 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000040)=""/92) 09:10:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") prctl$PR_SET_MM(0x23, 0xf, &(0x7f00009aa000/0x1000)=nil) [ 1024.646110] audit: type=1400 audit(1555924212.158:3564): avc: denied { map } for pid=29915 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:13 executing program 1: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_security(0x11, r0, &(0x7f0000001340)=""/101, 0x65) [ 1024.788757] audit: type=1400 audit(1555924212.278:3565): avc: denied { map } for pid=29915 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0xa4, r3, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc0}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xf141}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) setsockopt$sock_int(r1, 0x1, 0x3f, &(0x7f0000000080)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r4 = socket(0x11, 0x80002, 0x0) bind$packet(r4, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() setpriority(0x2, r1, 0x0) write$input_event(r0, &(0x7f00000000c0)={{0x0, 0x2710}, 0x0, 0x0, 0x221}, 0x18) preadv(r0, &(0x7f00000017c0), 0x1be, 0x0) 09:10:13 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='uid=', @ANYRESDEC]) 09:10:14 executing program 1: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_security(0x11, r0, &(0x7f0000001340)=""/101, 0x65) 09:10:14 executing program 5: r0 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) ioctl(r0, 0x1, &(0x7f0000000000)) 09:10:14 executing program 2: mmap(&(0x7f000053b000/0x2000)=nil, 0x2000, 0x1000004, 0x40000002871, 0xffffffffffffffff, 0x0) munmap(&(0x7f000053c000/0x1000)=nil, 0x1000) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) 09:10:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f1228123f319bd070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x1000000802}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000001c0)='nr0\x01\x00?\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1\x00'/591) 09:10:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, 0x4) 09:10:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x10000, 0x4, 0x100, 0x400}, 0x10) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000080)={{0x0, @empty, 0x4e22, 0x0, 'lc\x00', 0x24, 0x2, 0x16}, {@local, 0x4e24, 0x0, 0xfffffffffffffc01, 0x7, 0x58a40000}}, 0x44) fsetxattr$security_smack_transmute(r0, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) 09:10:15 executing program 1: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_security(0x11, r0, &(0x7f0000001340)=""/101, 0x65) 09:10:15 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x2287, &(0x7f0000000040)={0xb0, ""/176}) 09:10:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x1764ac4) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/114, 0x72}], 0x1) r1 = dup2(r0, r0) write$P9_RREAD(r1, 0x0, 0x0) 09:10:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)=0x3) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x4008ae61, &(0x7f0000000440)={0x0, 0x17, @ioapic}) 09:10:16 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000007a84306910000000b000f0035020000060000001900154004000001d40000dc1338d54400009b84136ef75afb83de44110016000d0004000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 09:10:16 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x2287, &(0x7f0000000040)={0xb0, ""/176}) [ 1027.477730] net_ratelimit: 18 callbacks suppressed [ 1027.477739] protocol 88fb is buggy, dev hsr_slave_0 [ 1027.488188] protocol 88fb is buggy, dev hsr_slave_1 [ 1027.493448] protocol 88fb is buggy, dev hsr_slave_0 [ 1027.498749] protocol 88fb is buggy, dev hsr_slave_1 09:10:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) close(r1) pipe(&(0x7f00000000c0)) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000000)="fb", 0x1}], 0x1) write$binfmt_misc(r2, &(0x7f0000000200)={'syz1'}, 0xfdef) 09:10:16 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x2287, &(0x7f0000000040)={0xb0, ""/176}) 09:10:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1028.277741] protocol 88fb is buggy, dev hsr_slave_0 [ 1028.282959] protocol 88fb is buggy, dev hsr_slave_1 [ 1028.288205] protocol 88fb is buggy, dev hsr_slave_0 [ 1028.293494] protocol 88fb is buggy, dev hsr_slave_1 [ 1028.368459] netlink: 'syz-executor.1': attribute type 15 has an invalid length. [ 1028.396442] netlink: 'syz-executor.1': attribute type 21 has an invalid length. [ 1028.421643] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:10:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f0000000040), 0x8) 09:10:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x14) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x2800810c0045002, &(0x7f0000000040)) 09:10:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x7) [ 1028.597745] protocol 88fb is buggy, dev hsr_slave_0 [ 1028.602891] protocol 88fb is buggy, dev hsr_slave_1 [ 1028.715322] kauditd_printk_skb: 83 callbacks suppressed [ 1028.715337] audit: type=1400 audit(1555924217.248:3649): avc: denied { map } for pid=31401 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1028.864792] audit: type=1400 audit(1555924217.288:3650): avc: denied { map } for pid=31401 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1029.002467] audit: type=1400 audit(1555924217.288:3651): avc: denied { map } for pid=31401 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1029.161604] audit: type=1400 audit(1555924217.288:3652): avc: denied { map } for pid=31401 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x2287, &(0x7f0000000040)={0xb0, ""/176}) [ 1029.338411] audit: type=1400 audit(1555924217.448:3653): avc: denied { map } for pid=31401 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1029.457891] audit: type=1400 audit(1555924217.448:3654): avc: denied { map } for pid=31403 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1029.584847] audit: type=1400 audit(1555924217.448:3655): avc: denied { map } for pid=31403 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1029.728367] audit: type=1400 audit(1555924217.478:3656): avc: denied { map } for pid=31403 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1029.901677] audit: type=1400 audit(1555924217.488:3657): avc: denied { map } for pid=31401 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) close(r1) pipe(&(0x7f00000000c0)) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000000)="fb", 0x1}], 0x1) write$binfmt_misc(r2, &(0x7f0000000200)={'syz1'}, 0xfdef) 09:10:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) [ 1030.061917] audit: type=1400 audit(1555924217.498:3658): avc: denied { map } for pid=31403 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000080)={0x6, 0x3, 0x45}) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x14) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x2800810c0045002, &(0x7f0000000040)) 09:10:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x11) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) dup2(r1, r0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) 09:10:19 executing program 0: r0 = memfd_create(&(0x7f00000005c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x004\xdd\x0e\xad\xb4\x83\x0f?Y\x94q\xbe\v=\\\xe9[n\xa3\xc6b\x8a\x92,\xddz\xe8\xd0\x88O\xd4\\\xd2\x9c\x90\x84\x9fP)|\xde\xb3E1\xf7\xbc\xbe~G{$\xad\xf7\xc8\xd4\x80\xce\x94\xd3\xbe\xae\xf7\xbb\xc2\x1d\xf0\xafZ\x99\x7f\xb8^z=\x83\xb5\xe5y1.c++\x9aW\xb2\x94\x89-j\xa1\'\x1f\x19k\xb3Q\xa6\x18\x8d\xe4\rR\a\x1b)\xc0s\xa9u\xb1x\xf5c\xd3\a\xeb\x7f\xb1&a\xfa\xdcZ\xfc\x80D\r\xac\r\xcbVfYT`\x8c\xeauW\xd6\x93\x02M\xd8\xbea\xe4\xa1\xdb\xbf7^\x1ch\xa2\xc9Ux*\x03\xbd7\xebFi\xa3\xc0\x81\xe2\x85~\xefP\x12\x90\xce+q\x9a\x86\x8c\xf3{\xd6\xed\x9a\xf3\xc9\xe8\xf1\xda\x1a\xbb\x95\xaaR\x11\xb6\xfa\xa9\x1d\x12\xa3\xc3\xe7B\x14\xa6`\xdd\x83\xde\xb6\xabB\xb9\xed\xd6U\xa5#-\xe1@\xf7\xf7\x8et\xd6H\x9bF\\oF\xba\xcb\x0erJD\xf9\xd6\xd2\xd0vG\xfe\xb6\xae\xc8\x9f\x89 \xff\x9c\x04\xf5\x86\xfbM\xfd\xcc:\vQ\xdd\x1f0:\x06\xf5\xda\xfb\xc9\x86p\xd4\xb7\f\xb7\xaa]\x05N0\xb9o\'^\x117d<\xbd\x1f\xac\xf4\xc8\x15%\x1f\x9c\xd1\xb9B\x84\xa1;\x85\"\xd4\x92\xa3\x1f\x87Z\x9a', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="84feecff370000000000000000000000000000000000de"], 0x17) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20000057d) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r2 = dup2(r1, r0) write$P9_RLINK(r2, &(0x7f0000000040)={0x7}, 0x3ed) 09:10:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) close(r1) pipe(&(0x7f00000000c0)) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000000)="fb", 0x1}], 0x1) write$binfmt_misc(r2, &(0x7f0000000200)={'syz1'}, 0xfdef) 09:10:20 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) creat(0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 09:10:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x11) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) dup2(r1, r0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) 09:10:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0xdf3e3c6520c82cb0, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000200)={0x2, r3}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000080)={{0x2f, @broadcast, 0x4e21, 0x4, 'wlc\x00', 0x20, 0x101, 0x5d}, {@local, 0x4e22, 0x2, 0x7, 0x93d5, 0xfff}}, 0x44) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r4 = socket(0x11, 0x80002, 0x0) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x80, 0x0) dup3(r5, r1, 0x80000) bind$packet(r4, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) close(r1) pipe(&(0x7f00000000c0)) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000000)="fb", 0x1}], 0x1) write$binfmt_misc(r2, &(0x7f0000000200)={'syz1'}, 0xfdef) 09:10:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x11) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) dup2(r1, r0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) 09:10:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$netlink(r1, &(0x7f0000000080), 0x41) ioctl(r0, 0x1000008912, &(0x7f00000003c0)="0adc1f123c123f319bd070") 09:10:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x14) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x2800810c0045002, &(0x7f0000000040)) 09:10:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x11) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) dup2(r1, r0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) [ 1032.757750] net_ratelimit: 22 callbacks suppressed [ 1032.757760] protocol 88fb is buggy, dev hsr_slave_0 [ 1032.768340] protocol 88fb is buggy, dev hsr_slave_1 [ 1032.997757] protocol 88fb is buggy, dev hsr_slave_0 [ 1033.003037] protocol 88fb is buggy, dev hsr_slave_1 09:10:21 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000140)) r2 = openat$cgroup_subtree(r0, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000a780)=[{{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000400)=""/142, 0x8e}], 0x1}}], 0x1, 0x0, 0x0) close(r2) openat$cgroup_int(r0, &(0x7f0000000100)='io.max\x00', 0x2, 0x0) readv(r2, &(0x7f00000002c0), 0x179) 09:10:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x11) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) dup2(r1, r0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) 09:10:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f00000003c0)=0x7fff) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = syz_open_dev$vbi(&(0x7f0000000540)='/dev/vbi#\x00', 0x1, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000300)=0x2) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f00000002c0)={0x1, [0x0]}) r4 = socket(0x11, 0x80002, 0x0) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f0000000340)={0x0, r3}) bind$packet(r4, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x400000, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x400100) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000200)={0x7ff, 0x9, 0xe3, &(0x7f00000000c0)="fd615e6860a6e1b064e0b469c0a08353d91847320f67f3605a255a7a33a30589971be418a88397cb5036b7d9715eafd5a3f989bab5e52a9713721a4206e1d0cc7b85321fa84ad049b9a127bbdf952172071ca51f9706f630b90f4533892c6cadbbf6d083be3ed716dc4f3eda8402bb5efc1d787bf8df12075b5d24f93ffd8cb25b76c5385503fc71b17a529491ac71c50d64326c14dfeba143c350f687267f3ab38611efe84de03d6b9f1bbd4cf3f0eb7e830668780255581499deff7e504a5a8b40375007f5361917e16550bec33ca83f1d175ee6d86ee6308638800307347bf96f10"}) 09:10:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x14) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x2800810c0045002, &(0x7f0000000040)) 09:10:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x11) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) dup2(r1, r0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) [ 1033.717740] protocol 88fb is buggy, dev hsr_slave_0 [ 1033.723034] protocol 88fb is buggy, dev hsr_slave_1 [ 1033.728360] protocol 88fb is buggy, dev hsr_slave_0 [ 1033.733576] protocol 88fb is buggy, dev hsr_slave_1 09:10:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000280)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") write$P9_ROPEN(r1, &(0x7f0000000000)={0x8, 0x12}, 0x18) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 09:10:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x11) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) dup2(r1, r0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) [ 1034.128774] kauditd_printk_skb: 92 callbacks suppressed [ 1034.128789] audit: type=1400 audit(1555924222.658:3751): avc: denied { map } for pid=32659 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1034.247826] audit: type=1400 audit(1555924222.668:3752): avc: denied { map } for pid=32659 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1034.366812] audit: type=1400 audit(1555924222.668:3753): avc: denied { map } for pid=32659 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1034.477324] audit: type=1400 audit(1555924222.708:3754): avc: denied { map } for pid=32659 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:23 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1) [ 1034.517746] protocol 88fb is buggy, dev hsr_slave_0 [ 1034.522881] protocol 88fb is buggy, dev hsr_slave_1 09:10:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{}, {0x7, 0x1}}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1034.617996] audit: type=1400 audit(1555924222.778:3755): avc: denied { map } for pid=32659 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) recvmmsg(r2, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) [ 1034.789416] audit: type=1400 audit(1555924222.828:3756): avc: denied { map } for pid=32659 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbff, 0x209090}, 0xc) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1034.945087] audit: type=1400 audit(1555924222.848:3757): avc: denied { map } for pid=32659 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1035.078247] audit: type=1400 audit(1555924222.868:3758): avc: denied { map } for pid=32664 comm="syz-executor.1" path="/dev/dsp" dev="devtmpfs" ino=16522 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 [ 1035.264713] audit: type=1400 audit(1555924222.878:3759): avc: denied { map } for pid=32659 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1035.390662] audit: type=1400 audit(1555924222.928:3760): avc: denied { map } for pid=32659 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="d770df1f"], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x105140, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:10:24 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x200, 0x0) close(r0) 09:10:24 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, &(0x7f0000000280)) 09:10:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xfffffffffffffe4c, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x10}]}}}]}, 0x3c}}, 0x0) 09:10:24 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000080)=0x208010, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x402000) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x2, @local, 'batadv0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f0000005b40), 0x40000000000014d, 0x0) 09:10:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{}, {0x7, 0x1}}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:10:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r5, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) clock_gettime(0x1, &(0x7f00000000c0)) setsockopt$inet6_buf(r5, 0x29, 0xef, &(0x7f0000000600)="0294899499e5f22f9c5f8e3875af05ea53e0480cf080f7f128910d005d3c72cf4a3dca790600f7271a0778bdf835503a7d1511ba9461659b23e7d4f6a31b9642065dad2759c82866541df7d3e8b19aa82049f6a03325ecdf6220eac5c3b80f3c6c5b8ddbc3b4d43195d3fea189399f81a0753bce32e903767c22fd37b4750a4b7cf613995a949e22a9c305cae307ac64b100368aa665593bda4321b954ed75b35dea95b23abc23f33116b40cf16460dc3cea1ed979af8b3ce377c2e52e0b7ac4f9561602a04c94587ad1215eacd78e2996397b38435cca917318a6d3b26897e239037c6e2718e71e", 0xe8) sendmmsg(r3, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1036.844955] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 09:10:25 executing program 0: remap_file_pages(&(0x7f0000008000/0x4000)=nil, 0x500, 0x0, 0x0, 0x0) 09:10:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x2000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:10:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{}, {0x7, 0x1}}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:10:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:dhcpd_state_t:s0\x00', 0x23, 0x2) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1037.877740] net_ratelimit: 18 callbacks suppressed [ 1037.877750] protocol 88fb is buggy, dev hsr_slave_0 [ 1037.888072] protocol 88fb is buggy, dev hsr_slave_1 [ 1037.893362] protocol 88fb is buggy, dev hsr_slave_0 [ 1037.898595] protocol 88fb is buggy, dev hsr_slave_1 09:10:26 executing program 2: socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10004, 0xeefffdef) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x2, 0x4) close(r0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140), 0x0) 09:10:26 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000100)="a2e6fa9a", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x79) write$binfmt_aout(r0, &(0x7f0000000780)={{0x107, 0x0, 0x0, 0xd, 0x1a0ffffffff, 0x0, 0x0, 0x0, 0xa}}, 0xfdef) 09:10:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{}, {0x7, 0x1}}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1038.677742] protocol 88fb is buggy, dev hsr_slave_0 [ 1038.682939] protocol 88fb is buggy, dev hsr_slave_1 [ 1038.688339] protocol 88fb is buggy, dev hsr_slave_0 [ 1038.693463] protocol 88fb is buggy, dev hsr_slave_1 [ 1039.007765] protocol 88fb is buggy, dev hsr_slave_0 [ 1039.012893] protocol 88fb is buggy, dev hsr_slave_1 09:10:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001140)="0adc03263c343f319bd070") unshare(0x8020000) semget$private(0x0, 0x6, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') setns(r1, 0x0) [ 1039.148735] kauditd_printk_skb: 69 callbacks suppressed [ 1039.148750] audit: type=1400 audit(1555924227.688:3830): avc: denied { map } for pid=1417 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7f, 0x2, [0x0, 0x0, 0xc0000101]}) 09:10:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0xbc8, 0x1, 0x8, 0x213900, 0x5, 0x8, 0xdcb, 0x0, r2}, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r4 = socket(0x11, 0x80002, 0x0) bind$packet(r4, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r3, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1039.326335] audit: type=1400 audit(1555924227.688:3831): avc: denied { map } for pid=1417 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:28 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 1039.490214] audit: type=1400 audit(1555924227.688:3832): avc: denied { map } for pid=1417 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x25, &(0x7f00000003c0)=0xb5e, 0x1f7) listen(r1, 0x100000001) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xb) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) [ 1039.665839] audit: type=1400 audit(1555924227.738:3833): avc: denied { map } for pid=1417 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:28 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x75d) sendto(r0, &(0x7f0000000000)='N', 0x1, 0xfffffffffffffffe, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)="8c", 0x1}], 0x1}, 0x0) [ 1039.777773] audit: type=1400 audit(1555924227.768:3834): avc: denied { map } for pid=1417 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1039.967812] audit: type=1400 audit(1555924227.838:3835): avc: denied { map } for pid=1417 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x201, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000380)={0x0, 0x989680}, 0x0, 0x0) [ 1040.097893] audit: type=1400 audit(1555924227.858:3836): avc: denied { map } for pid=1417 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1040.248480] audit: type=1400 audit(1555924227.928:3837): avc: denied { map } for pid=1417 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1040.411750] audit: type=1400 audit(1555924227.938:3838): avc: denied { map } for pid=1417 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1040.569308] audit: type=1400 audit(1555924227.998:3839): avc: denied { map } for pid=1417 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:29 executing program 3: ioctl(0xffffffffffffffff, 0x3, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x20001, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0x6, &(0x7f00000000c0)=0x3, 0x4) r1 = socket(0x11, 0x80002, 0x0) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x80002, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x12}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x800, 0x0) 09:10:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000006480), 0x4) 09:10:29 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="240000001a0007041dfffd946f6105000a0000001f0000000000080008001b003a000000", 0x24}], 0x1}, 0x0) 09:10:29 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x10}, 0xc) r0 = socket$inet6(0xa, 0x80002, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140), 0x14a}}], 0x40001ab, 0x8080) 09:10:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:10:30 executing program 2: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x169, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3e) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x400000000006, 0xe, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1041.840677] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 09:10:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x50, 0x0, &(0x7f0000000080)) 09:10:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x7c5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000100)={r3, 0x2, "ebab"}, &(0x7f0000000140)=0xa) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:30 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) 09:10:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) socket$packet(0x11, 0x2, 0x300) write(r0, &(0x7f0000000000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 09:10:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") time(0x0) 09:10:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 09:10:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r2}) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1043.157772] net_ratelimit: 22 callbacks suppressed [ 1043.157781] protocol 88fb is buggy, dev hsr_slave_0 [ 1043.167926] protocol 88fb is buggy, dev hsr_slave_1 [ 1043.397886] protocol 88fb is buggy, dev hsr_slave_0 [ 1043.403130] protocol 88fb is buggy, dev hsr_slave_1 09:10:32 executing program 4: r0 = socket(0x1, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)={0x300}) 09:10:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$ppp(0xffffffffffffffff, &(0x7f0000000100)="704be2", 0x3) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffd3d, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff1b, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1044.117735] protocol 88fb is buggy, dev hsr_slave_0 [ 1044.122991] protocol 88fb is buggy, dev hsr_slave_1 [ 1044.128344] protocol 88fb is buggy, dev hsr_slave_0 [ 1044.133538] protocol 88fb is buggy, dev hsr_slave_1 09:10:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000100)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={r2, 0x0, 0x1}) 09:10:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x406855c9, 0x0) 09:10:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") time(0x0) [ 1044.645396] kauditd_printk_skb: 88 callbacks suppressed [ 1044.645412] audit: type=1400 audit(1555924233.178:3928): avc: denied { map } for pid=3400 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1044.755990] audit: type=1400 audit(1555924233.228:3929): avc: denied { map } for pid=3400 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x88, r3, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffff}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r4 = socket(0x11, 0x80002, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080)=0x6, 0x4) bind$packet(r4, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1044.858258] audit: type=1400 audit(1555924233.228:3930): avc: denied { map } for pid=3400 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1044.917771] protocol 88fb is buggy, dev hsr_slave_0 [ 1044.922937] protocol 88fb is buggy, dev hsr_slave_1 [ 1045.017072] audit: type=1400 audit(1555924233.228:3931): avc: denied { map } for pid=3400 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1045.153714] audit: type=1400 audit(1555924233.278:3932): avc: denied { map } for pid=3400 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000040)={0x30001, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1045.309050] audit: type=1400 audit(1555924233.348:3933): avc: denied { map } for pid=3400 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") time(0x0) [ 1045.471302] audit: type=1400 audit(1555924233.358:3934): avc: denied { map } for pid=3400 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x54}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) 09:10:34 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 09:10:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x9, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0xc005, @multicast2}]}}}]}, 0x40}}, 0x0) [ 1045.648709] audit: type=1400 audit(1555924233.448:3935): avc: denied { map } for pid=3400 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1045.839148] audit: type=1400 audit(1555924233.458:3936): avc: denied { map } for pid=3400 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1045.998874] audit: type=1400 audit(1555924233.518:3937): avc: denied { map } for pid=3400 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:35 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 09:10:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") time(0x0) 09:10:35 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000280)) 09:10:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xfdce) r0 = socket$kcm(0xa, 0x3, 0x87) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000037c0)=""/4096, 0x1000}, 0x0) sendmsg$kcm(r0, &(0x7f0000002780)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000001380), 0x2ed, &(0x7f0000000100)}, 0x0) 09:10:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$UHID_CREATE(r3, &(0x7f0000000200)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/152, 0x98, 0x101, 0x7, 0x0, 0x80000000000000, 0x2}, 0x120) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 09:10:35 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 09:10:36 executing program 2: rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffa}, 0x0, 0x8) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x18, r0) 09:10:36 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="240000005e0007041dfffd946f610500070000001d00000004000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 09:10:36 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="240000005e0007041dfffd946f610500070000001d00000004000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 09:10:36 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 09:10:36 executing program 1: r0 = socket$packet(0x11, 0x400000000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x4000000028, 0x0, 0x0, 0xfffff00c}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x11, &(0x7f0000000080)={@local, @dev, [], {@x25}}, 0x0) [ 1048.277772] net_ratelimit: 18 callbacks suppressed [ 1048.277781] protocol 88fb is buggy, dev hsr_slave_0 [ 1048.288137] protocol 88fb is buggy, dev hsr_slave_1 [ 1048.293426] protocol 88fb is buggy, dev hsr_slave_0 [ 1048.298647] protocol 88fb is buggy, dev hsr_slave_1 09:10:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x7, @multicast2}, 0xfffffffffffffde8) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) socket(0x5, 0xa, 0x6) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) sendfile(r0, r1, 0x0, 0x8000fffffffe) 09:10:37 executing program 2: setrlimit(0x7, &(0x7f0000000000)={0x4, 0xa1}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x3) 09:10:37 executing program 5: clock_adjtime(0x44, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000080)) 09:10:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="240000005e0007041dfffd946f610500070000001d00000004000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 1049.077761] protocol 88fb is buggy, dev hsr_slave_0 [ 1049.082895] protocol 88fb is buggy, dev hsr_slave_1 [ 1049.088120] protocol 88fb is buggy, dev hsr_slave_0 [ 1049.093227] protocol 88fb is buggy, dev hsr_slave_1 [ 1049.397793] protocol 88fb is buggy, dev hsr_slave_0 [ 1049.402948] protocol 88fb is buggy, dev hsr_slave_1 [ 1049.660008] kauditd_printk_skb: 93 callbacks suppressed [ 1049.660024] audit: type=1400 audit(1555924238.198:4031): avc: denied { map } for pid=4559 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:38 executing program 2: r0 = open(&(0x7f0000fedff8)='./file0\x00', 0x141042, 0x0) utime(&(0x7f0000ff1000)='./file0\x00', &(0x7f000067bff0)={0x0, 0xffff}) fstat(r0, &(0x7f0000000fbc)) sigaltstack(&(0x7f0000001000/0x1000)=nil, 0x0) sigaltstack(&(0x7f0000000000/0x1000)=nil, &(0x7f00005d6000)) [ 1049.857164] audit: type=1400 audit(1555924238.198:4032): avc: denied { map } for pid=4500 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) r2 = dup2(r1, r1) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) sendmsg$tipc(r2, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)='|', 0x1}], 0x1}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='nv\x00', 0x3) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0xf7) [ 1050.017784] audit: type=1400 audit(1555924238.238:4033): avc: denied { map } for pid=4559 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:38 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="240000005e0007041dfffd946f610500070000001d00000004000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 1050.157160] audit: type=1400 audit(1555924238.278:4034): avc: denied { map } for pid=4500 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:38 executing program 4: setgroups(0x2, &(0x7f00000004c0)=[0x0, 0x0]) getgroups(0x1, &(0x7f0000000500)=[0x0]) [ 1050.271495] audit: type=1400 audit(1555924238.288:4035): avc: denied { map } for pid=4559 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1050.379653] audit: type=1400 audit(1555924238.288:4036): avc: denied { map } for pid=4500 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f00000000c0)={0x5, 0x80, 0x1}) [ 1050.552427] audit: type=1400 audit(1555924238.308:4037): avc: denied { map } for pid=4559 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="09000000070000004c000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 1050.677970] audit: type=1400 audit(1555924238.378:4038): avc: denied { map } for pid=4559 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1050.798892] audit: type=1400 audit(1555924238.448:4039): avc: denied { map } for pid=4559 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1050.928391] audit: type=1400 audit(1555924238.468:4040): avc: denied { map } for pid=4559 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:39 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000000000000000003000010003030000ff3f567b0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f00000020c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$key(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 09:10:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x1, 0x0) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xfffffffffffffe15) sendmmsg$unix(r1, &(0x7f0000000980)=[{&(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000004c0)=[@rights={0x18, 0x1, 0x1, [r2]}], 0x18}], 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:10:40 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000020ff0)=[{&(0x7f000001d000)="2f0000001c00037affffff000d0000000200000001000000000003c91300010000000000000000005867000000050b", 0x2f}], 0x1}, 0x0) 09:10:40 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000d4164dab827d472fdb53082d5701bebf830c90f6603be2eb1d069f4645e1e1c8461640985acd29b5c1e249ca"], 0x33) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 09:10:40 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") getsockopt$inet6_int(r0, 0x28, 0x0, 0x0, &(0x7f00000000c0)=0x700) 09:10:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000200)="84f997a70d5d56e7ab3e0b039c2ddc6562582bbd0f3186cecc8225a72abaed857f9470a2ca4473dd6063cc762e4a08d162540191fc1dc0dac7ab46484ac2e8cd0d7bbc2956dbdce9f9cc75a027e13749ba1c2a885570750f766d8ce1a9d7b47c71a7fc7e6f5710363eeca11b2f26e34d67b9fed895a5423e2567f775", 0x7c}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$VIDIOC_G_FMT(r3, 0xc0d05604, &(0x7f00000000c0)={0x7, @sdr={0x0, 0x8}}) 09:10:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0x5, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x7fff}, 0x3c) 09:10:40 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000000000000000003000010003030000ff3f567b0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f00000020c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$key(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 09:10:41 executing program 4: open(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x2080, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendto(0xffffffffffffffff, 0x0, 0xa8, 0x0, 0x0, 0x863b6b7602ec05da) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) setitimer(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc010643a, &(0x7f0000000700)={0x3e}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(r3, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x2040, 0x0) r4 = dup2(r0, 0xffffffffffffffff) write$P9_RWSTAT(r4, &(0x7f00000000c0)={0x7}, 0x7) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0xffffffffffffffff) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x8, 0x800) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:10:41 executing program 1: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x8100, 'yam0\x00', 'bcsf0\x00', 'ipddp0\x00', 'sit0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@time={'time\x00', 0x18}, @vlan={'vlan\x00', 0x8, {{0x0, 0x0, 0x0, 0x1ffffa}}}]}}, @common=@mark={'mark\x00', 0x10}}]}]}, 0x220) 09:10:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80000001}, 0x4e) bind(r1, 0x0, 0x0) close(r1) 09:10:42 executing program 5: r0 = gettid() futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) [ 1053.557745] net_ratelimit: 22 callbacks suppressed [ 1053.557755] protocol 88fb is buggy, dev hsr_slave_0 [ 1053.567955] protocol 88fb is buggy, dev hsr_slave_1 09:10:42 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000000000000000003000010003030000ff3f567b0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f00000020c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$key(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 1053.797752] protocol 88fb is buggy, dev hsr_slave_0 [ 1053.802992] protocol 88fb is buggy, dev hsr_slave_1 09:10:42 executing program 4: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_netdev_private(r0, 0x89f6, &(0x7f00000001c0)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) mount$9p_rdma(&(0x7f0000000340)='127.0.0.1\xc0', &(0x7f0000000380)='./file0\x00', &(0x7f0000000440)='9p\x00', 0x800, &(0x7f0000000480)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@timeout={'timeout'}}, {@rq={'rq', 0x3d, 0xffffffffffff7251}}, {@rq={'rq', 0x3d, 0x20}}], [{@appraise='appraise'}]}}) linkat(r0, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1400) r1 = socket$netlink(0x10, 0x3, 0x10000000c) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002033700000007000000068100022b0509000100", 0x18}], 0x1) close(0xffffffffffffffff) 09:10:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) bind$packet(r2, &(0x7f0000000480)={0x11, 0x1, r3, 0x1, 0x0, 0x6, @remote}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1054.517793] protocol 88fb is buggy, dev hsr_slave_0 [ 1054.523074] protocol 88fb is buggy, dev hsr_slave_1 [ 1054.528461] protocol 88fb is buggy, dev hsr_slave_0 [ 1054.533670] protocol 88fb is buggy, dev hsr_slave_1 09:10:43 executing program 1: r0 = socket(0x200040000000015, 0x805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt(r0, 0x114, 0x271c, 0x0, &(0x7f000033bffc)=0x32000000) [ 1054.704022] kauditd_printk_skb: 90 callbacks suppressed [ 1054.704038] audit: type=1400 audit(1555924243.238:4131): avc: denied { map } for pid=5896 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1054.857365] audit: type=1400 audit(1555924243.238:4132): avc: denied { map } for pid=5896 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1055.015747] audit: type=1400 audit(1555924243.278:4133): avc: denied { map } for pid=5896 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:43 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000000000000000003000010003030000ff3f567b0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f00000020c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$key(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 09:10:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80000001}, 0x4e) bind(r1, 0x0, 0x0) close(r1) [ 1055.181945] audit: type=1400 audit(1555924243.288:4134): avc: denied { map } for pid=5896 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1055.317749] protocol 88fb is buggy, dev hsr_slave_0 [ 1055.323045] protocol 88fb is buggy, dev hsr_slave_1 [ 1055.353148] audit: type=1400 audit(1555924243.368:4135): avc: denied { map } for pid=5896 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:44 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af22, &(0x7f0000000080)) [ 1055.542511] audit: type=1400 audit(1555924243.428:4136): avc: denied { map } for pid=5896 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x1, 0x10001, 0x4, 0x6, 0x5}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000240)={r3, 0x3, 0x1000000000000, 0xfffffffffffff64f, 0x370ee94c0000000, 0x4}, 0x14) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r4 = socket(0x11, 0x80002, 0x0) bind$packet(r4, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000000280)={0x10001, 0x6, 0x3, 0x8}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1055.736344] audit: type=1400 audit(1555924243.448:4137): avc: denied { map } for pid=5896 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:44 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) mlock2(&(0x7f0000004000/0x400000)=nil, 0x400000, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) [ 1055.864000] audit: type=1400 audit(1555924243.508:4138): avc: denied { map } for pid=5896 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1056.017851] audit: type=1400 audit(1555924243.518:4139): avc: denied { map } for pid=5896 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80000001}, 0x4e) bind(r1, 0x0, 0x0) close(r1) [ 1056.139968] audit: type=1400 audit(1555924243.618:4140): avc: denied { map } for pid=5896 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x7}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 09:10:45 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x2e8, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r1, r0, &(0x7f00000003c0), 0x70fa) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000004c0)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000640)=0x7, 0x4) preadv(r0, &(0x7f00000004c0), 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000080)=0x2000101) 09:10:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="087c86de5d99e248158d823e99ab11d62f3f9cecf073a2455cee6e04e7dbf88781725dba13b0821f987fda75e0a1ebc3e6be706f47a303841da49cc6373501000000f6461b80a8c182d06e339a3ca3a0cf8e1a19da5c38e3583b9ce5b32295d1746087ab9cb8b0d971f2f5cff9e60b88973298a27a3144c8d8c4f145f5af73") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x2040) ioctl$VIDIOC_SUBDEV_G_CROP(r3, 0xc038563b, &(0x7f0000000100)={0x0, 0x0, {0x5, 0x1000, 0x6, 0xfffffffffffff3a2}}) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80000001}, 0x4e) bind(r1, 0x0, 0x0) close(r1) 09:10:45 executing program 5: syz_emit_ethernet(0x6e, &(0x7f0000000080)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x38, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x6c, 0x0, @loopback, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, [], "802a08000000006b"}}}}}}}, 0x0) 09:10:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 09:10:46 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x4000007) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000240)={0x1000}, 0x1) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x1000, &(0x7f0000002000/0x3000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, 0x0) socket$pptp(0x18, 0x1, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000400)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x43f, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000180)=0xffffffffffffffff, 0x4) ioctl$BLKFRASET(r0, 0x1264, &(0x7f00000000c0)=0x8000) 09:10:46 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f00000008c0)={&(0x7f0000000100)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000800)=[@zcopy_cookie={0x18, 0x114, 0x2}], 0x18}, 0x4000000) 09:10:46 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') ftruncate(r0, 0x101) 09:10:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bc070") r1 = socket$inet(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005a0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 1058.677719] net_ratelimit: 18 callbacks suppressed [ 1058.677728] protocol 88fb is buggy, dev hsr_slave_0 [ 1058.688042] protocol 88fb is buggy, dev hsr_slave_1 [ 1058.693313] protocol 88fb is buggy, dev hsr_slave_0 [ 1058.698559] protocol 88fb is buggy, dev hsr_slave_1 09:10:47 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r1}) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:10:47 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xfbb0ef9d6bddbbf1, 0x0) accept4$ax25(0xffffffffffffffff, 0x0, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000380)=ANY=[], 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(r0, 0x0, 0x1000000a0000008, 0x0) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) [ 1059.477780] protocol 88fb is buggy, dev hsr_slave_0 [ 1059.482956] protocol 88fb is buggy, dev hsr_slave_1 [ 1059.488187] protocol 88fb is buggy, dev hsr_slave_0 [ 1059.493289] protocol 88fb is buggy, dev hsr_slave_1 09:10:48 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000001780)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0x40045613, &(0x7f0000000200)={0x0, 0x0, 0x0, {0x0, @vbi}}) 09:10:48 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'erspan0\x00', 0x2}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}}) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 1059.772455] kauditd_printk_skb: 90 callbacks suppressed [ 1059.772471] audit: type=1400 audit(1555924248.308:4231): avc: denied { map } for pid=7167 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1059.800175] protocol 88fb is buggy, dev hsr_slave_0 [ 1059.800235] protocol 88fb is buggy, dev hsr_slave_1 09:10:48 executing program 1: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'sha384-generic\x00'}}) [ 1059.967450] audit: type=1400 audit(1555924248.308:4232): avc: denied { map } for pid=7167 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) io_setup(0x5, 0x0) write$ppp(0xffffffffffffffff, &(0x7f0000000240)='8', 0x1) io_submit(0x0, 0x0, 0x0) r0 = gettid() syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') writev(0xffffffffffffffff, &(0x7f0000000080), 0x0) timer_create(0x0, 0x0, &(0x7f0000000300)) ioprio_get$pid(0x0, r0) [ 1060.120418] audit: type=1400 audit(1555924248.348:4233): avc: denied { map } for pid=7167 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1060.309159] audit: type=1400 audit(1555924248.348:4234): avc: denied { map } for pid=7167 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1060.501316] audit: type=1400 audit(1555924248.408:4235): avc: denied { map } for pid=7167 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1060.656995] audit: type=1400 audit(1555924248.458:4236): avc: denied { map } for pid=7167 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:49 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x6, 0x10000}, 0x3c) [ 1060.798629] audit: type=1400 audit(1555924248.468:4237): avc: denied { map } for pid=7167 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1060.967415] audit: type=1400 audit(1555924248.558:4238): avc: denied { map } for pid=7167 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1061.145836] audit: type=1400 audit(1555924248.568:4239): avc: denied { map } for pid=7167 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1061.320817] audit: type=1400 audit(1555924248.658:4240): avc: denied { map } for pid=7167 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x277, 0xff0b8004], [0xc1]}) 09:10:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fde000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r2, 0x0) dup3(r2, r1, 0x0) 09:10:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 09:10:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x111003) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0xc0102, 0x0) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f00000000c0)=0x3) 09:10:50 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)) 09:10:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) [ 1062.641636] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:10:51 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000280)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}}, 0xa) [ 1062.730097] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 09:10:51 executing program 4: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0x151, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x1c9) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000940], 0x2, 0x0, &(0x7f0000000940)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0xb0, 0xb0, 0xe8, [@time={'time\x00', 0x18}]}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1f0) 09:10:51 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f0000000200)='\x00', 0x1, 0x3) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e55aed0cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974"]) chdir(&(0x7f0000000380)='./file0\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x10, &(0x7f00000002c0)={[{@mode={'mode'}}, {@mode={'mode', 0x3d, 0x1ff}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'overlay\x00'}}, {@dont_appraise='dont_appraise'}]}) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') readlink(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000e00)=""/4096, 0x1000) 09:10:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x14}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000300)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) write(r0, &(0x7f0000000140)="22000000e8037c4e47d7b1ccff652186979f580700f417e512b87cba48c1cb65d145", 0x22) [ 1063.268319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 09:10:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2270, 0x715000) [ 1063.437902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1063.957958] net_ratelimit: 22 callbacks suppressed [ 1063.957968] protocol 88fb is buggy, dev hsr_slave_0 [ 1063.968179] protocol 88fb is buggy, dev hsr_slave_1 09:10:52 executing program 2: mremap(&(0x7f0000158000/0x600000)=nil, 0x600000, 0x4000, 0x0, &(0x7f0000004000/0x4000)=nil) r0 = memfd_create(&(0x7f0000000140)='nbd\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) [ 1064.197805] protocol 88fb is buggy, dev hsr_slave_0 [ 1064.203071] protocol 88fb is buggy, dev hsr_slave_1 09:10:52 executing program 5: openat$rtc(0xffffffffffffff9c, 0x0, 0x2000, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) 09:10:53 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(r0, 0xc2604111, &(0x7f0000000000)) 09:10:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT(r1, 0xae60, 0x0) [ 1064.917738] protocol 88fb is buggy, dev hsr_slave_0 [ 1064.922981] protocol 88fb is buggy, dev hsr_slave_1 [ 1064.928412] protocol 88fb is buggy, dev hsr_slave_0 [ 1064.933610] protocol 88fb is buggy, dev hsr_slave_1 [ 1065.017090] kauditd_printk_skb: 85 callbacks suppressed [ 1065.017107] audit: type=1400 audit(1555924253.548:4326): avc: denied { map } for pid=8774 comm="syz-executor.2" path=2F6D656D66643A6E6264202864656C6574656429 dev="tmpfs" ino=131335 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 09:10:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0xc}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 09:10:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80) sendmsg$can_bcm(r1, &(0x7f0000003080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x5, 0xf, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "2d0c14c91ef86f03"}}, 0x48}}, 0x0) recvmmsg(r1, &(0x7f0000001c00)=[{{&(0x7f0000000bc0)=@vsock, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000c40)=""/226, 0xe2}, {0x0}], 0x2}}], 0x1, 0x10002, 0x0) [ 1065.360041] audit: type=1400 audit(1555924253.898:4327): avc: denied { map } for pid=8856 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:54 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0xfffffffffffffffd) read(r0, &(0x7f00000001c0)=""/215, 0xd7) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x200000000007, &(0x7f0000000e40), 0x4) [ 1065.456491] audit: type=1400 audit(1555924253.898:4328): avc: denied { map } for pid=8856 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1065.593484] audit: type=1400 audit(1555924253.898:4329): avc: denied { map } for pid=8856 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:54 executing program 2: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000100)={0x0, "5d477c19f9bd2bc944fc3d1e5c49bf38dfdb05edbf2c7938dc4feb4f7b24401f"}) [ 1065.717750] protocol 88fb is buggy, dev hsr_slave_0 [ 1065.722907] protocol 88fb is buggy, dev hsr_slave_1 [ 1065.927247] audit: type=1400 audit(1555924253.938:4330): avc: denied { map } for pid=8856 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1066.155244] audit: type=1400 audit(1555924253.938:4331): avc: denied { map } for pid=8881 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x17, &(0x7f0000001200)=""/145, &(0x7f0000000040)=0x91) [ 1066.255679] audit: type=1400 audit(1555924253.958:4332): avc: denied { map } for pid=8881 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:54 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 1066.429372] audit: type=1400 audit(1555924253.978:4333): avc: denied { map } for pid=8881 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1066.549654] audit: type=1400 audit(1555924253.988:4334): avc: denied { map } for pid=8881 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1066.667727] audit: type=1400 audit(1555924253.988:4335): avc: denied { map } for pid=8856 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:55 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000002ff0), 0x10) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000008000)={0x6, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_x_filter={0x5, 0x1a, @in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, @in6=@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, @sadb_x_nat_t_port={0x1}]}, 0x48}}, 0x0) 09:10:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x1, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000040), 0x0}, 0x18) 09:10:55 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x17642c4) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)) 09:10:55 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0xd, 0x0, 0xb, 0xa, 0xfdfdffff}) 09:10:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") clock_settime(0x0, &(0x7f0000000000)) 09:10:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x441}, 0x10) dup2(r2, r1) 09:10:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000020707021dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffaa010000000009b356da5a80d18be34c8546c8243929db2406b20cd37e001cc0", 0x4c}], 0x1}, 0x0) 09:10:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x8188aea6, &(0x7f0000000000)) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) 09:10:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001100090469001b00810800000700fd3f03000000450001070000001419001a0004002300070000000100000809c99183a8a5000200", 0x39}], 0x1) [ 1068.629265] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 09:10:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000001040), 0x4) connect$inet6(r0, &(0x7f00001cd000)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) [ 1069.077739] net_ratelimit: 18 callbacks suppressed [ 1069.077749] protocol 88fb is buggy, dev hsr_slave_0 [ 1069.088132] protocol 88fb is buggy, dev hsr_slave_1 [ 1069.093414] protocol 88fb is buggy, dev hsr_slave_0 [ 1069.098648] protocol 88fb is buggy, dev hsr_slave_1 09:10:57 executing program 5: syz_open_procfs$namespace(0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc31, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x101000) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xb) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="f0000000000000000000ffffffffffff000000003200000000000000000000000000ff0c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/156], 0x1}}, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffd000/0x1000)=nil) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x2}}, 0x20) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') 09:10:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x2, 0x4000000000031, 0xffffffffffffffff, 0x0) getrusage(0xffffffffffffffff, &(0x7f00000000c0)) 09:10:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100000000001fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x20000000000049, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) 09:10:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="31000000130009006900000000000010ab008048130000004600010700000014080003c0251c0000000000002000000000", 0x31}], 0x1) [ 1069.877743] protocol 88fb is buggy, dev hsr_slave_0 [ 1069.882939] protocol 88fb is buggy, dev hsr_slave_1 [ 1069.888438] protocol 88fb is buggy, dev hsr_slave_0 [ 1069.893634] protocol 88fb is buggy, dev hsr_slave_1 [ 1070.027517] kauditd_printk_skb: 98 callbacks suppressed [ 1070.027533] audit: type=1400 audit(1555924258.551:4434): avc: denied { map } for pid=10230 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00009f2000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x11, 0x2ff, 0x0, 0x0, {0x7}}, 0x14}}, 0x0) [ 1070.153961] audit: type=1400 audit(1555924258.611:4435): avc: denied { map } for pid=10230 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1070.197749] protocol 88fb is buggy, dev hsr_slave_0 [ 1070.203128] protocol 88fb is buggy, dev hsr_slave_1 09:10:59 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(0x0, &(0x7f0000000200)=""/112) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x1) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x4) [ 1070.528614] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. 09:10:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) 09:10:59 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000040)) [ 1070.932595] audit: type=1400 audit(1555924259.461:4436): avc: denied { map } for pid=10583 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:59 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x8000008010500c, &(0x7f0000000240)) [ 1071.082271] audit: type=1400 audit(1555924259.501:4437): avc: denied { map } for pid=10583 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @loopback, @dev}, 0xc) [ 1071.311338] audit: type=1400 audit(1555924259.521:4438): avc: denied { map } for pid=10583 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:10:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000000)="a200005c", 0x4) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = fcntl$dupfd(r1, 0x0, r1) move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000ffd000/0x3000)=nil], 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000040)={0x406}, 0xfdef) [ 1071.507782] audit: type=1400 audit(1555924259.531:4439): avc: denied { map } for pid=10583 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1071.613598] audit: type=1400 audit(1555924259.671:4440): avc: denied { map } for pid=10583 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1071.743621] audit: type=1400 audit(1555924259.741:4441): avc: denied { map } for pid=10583 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:00 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=@newspdinfo={0x5c, 0x24, 0x222a9accc56592f3, 0x0, 0x0, 0x0, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x5c}}, 0x0) [ 1071.900429] audit: type=1400 audit(1555924259.741:4442): avc: denied { map } for pid=10583 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040), 0x8) [ 1072.077756] audit: type=1400 audit(1555924259.781:4443): avc: denied { map } for pid=10583 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$kcm(0x10, 0x4000000003, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00000032008157e45ae087185082cf0300b0eb0400000016000a00000000000000000000000000081f401fe091", 0x2e}], 0x1}, 0x0) 09:11:00 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000340)=""/139) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x369e5d84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000200)={{0x3, 0x4, 0x2, 0x7f, 0x580, 0x3b64}, 0x36d5f252, 0x80000001, 0x0, 0x20, 0x444, "8e4595258f4f71a5c401709276ba82c6f24f89ea9b906830346a6a5d7d1874dfafa6c8dd6131d82ffbdd7e4bc1474490cbd42b3b3c0131bfedb11ecb3382d5410c546aac14db055fcee67ed36814ff2b2db31d2b83ba6b0444126469f9c369cddf7a69cd5618a1fcf2dc450cbb36741978ba3d80e1a8cdaccd391a09f8f80a2e"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x4, &(0x7f0000000500)=""/157, 0x9d) creat(&(0x7f00000001c0)='./bus\x00', 0x0) 09:11:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x40095}, 0x20000000) 09:11:01 executing program 1: capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x4) [ 1072.936139] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 09:11:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000940], 0x2, 0x0, &(0x7f0000000940)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0xb0, 0xb0, 0xe8, [@time={'time\x00', 0x18, {{0x0, 0x0, 0x6000000}}}]}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1f0) 09:11:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) syz_execute_func(&(0x7f0000000380)="cd8083b0f4c4c18de42800b0c421a5d916360f3801acddfeefffff7f00e1e142fd2a433fd0d010920c000880c48200f38a00000000b600e2c481c653650fcdc4e3a95ff665e3ea72be3c3b4d4d4d8048647c566f5a6f5a585a5266f247adc4a1fd28d2dd7d2f6745d00f65653e440f3806e10a1a24004c654c65c161fc4d9604047678de") 09:11:02 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000001740)=r0, 0x8) 09:11:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000040)={0x2400, 0x8, 0x7, 0x5c9}) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 09:11:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c12e33e9bd070") r1 = socket$kcm(0x10, 0x4000000003, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002b00672de45ae087185082cf0124b0eba06ec42404000000000000140000000000008d0051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1074.357798] net_ratelimit: 22 callbacks suppressed [ 1074.357808] protocol 88fb is buggy, dev hsr_slave_0 [ 1074.367981] protocol 88fb is buggy, dev hsr_slave_1 09:11:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) shmat(0x0, &(0x7f0000fef000/0x4000)=nil, 0x4000) read$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x3) [ 1074.597762] protocol 88fb is buggy, dev hsr_slave_0 [ 1074.602982] protocol 88fb is buggy, dev hsr_slave_1 [ 1074.629706] xt_time: invalid argument - start or stop time greater than 23:59:59 09:11:03 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x10bb, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='statm\x00\x01\xff\x9f\x1f\x94\xc3RA\xa2\xa7\x1f\xc9\x81\x9d@\x85\xed\xf4\x05\xbf\xfe \x97\xa3\xd2\x19\xa4\xac\x9f\x14\xff\x87\x1b\xe1\x17;M\xfda;\xa5\xaeb\vQE\xc4\x82\xb9\xe1\x1fO\x96\"\xa5\xee\xc5\xb5\x04\x13\xae\x14uULo\xad6y<\x88\xcf\x93\xd3(qY\xdb\xb2\x05\x9a\xb2g\xe4\x1at\xad\xa9\xe7\xa1\xc0(') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x0) 09:11:03 executing program 2: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0xa1, 0x74000a, 0xffffffff7ff0bdbe}) 09:11:03 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f00000000c0)={0x0, 0x1}) [ 1075.317733] protocol 88fb is buggy, dev hsr_slave_0 [ 1075.322995] protocol 88fb is buggy, dev hsr_slave_1 [ 1075.328794] protocol 88fb is buggy, dev hsr_slave_0 [ 1075.334026] protocol 88fb is buggy, dev hsr_slave_1 09:11:04 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sync() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x10, r0) ptrace(0x11, r0) 09:11:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x8b], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}) [ 1075.631922] kauditd_printk_skb: 83 callbacks suppressed [ 1075.631938] audit: type=1400 audit(1555924264.161:4527): avc: denied { map } for pid=11888 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffff55, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$int_in(r1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000004002, 0x0) sysfs$3(0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) [ 1075.827754] audit: type=1400 audit(1555924264.201:4528): avc: denied { map } for pid=11888 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1075.943809] audit: type=1400 audit(1555924264.201:4529): avc: denied { map } for pid=11888 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000004c0)={0x0, 0xf0ffffffffffff, &(0x7f0000000140)={&(0x7f0000000240)={0x68, r1, 0x2ff, 0x0, 0x0, {{0x1, 0x0, 0x3a1c}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0xf0, @link='broadcast-link\x00\x00\n\x00'}}}}, 0x123}}, 0x0) [ 1076.117749] protocol 88fb is buggy, dev hsr_slave_0 [ 1076.122879] protocol 88fb is buggy, dev hsr_slave_1 [ 1076.141466] audit: type=1400 audit(1555924264.201:4530): avc: denied { map } for pid=11888 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1076.282135] audit: type=1400 audit(1555924264.311:4531): avc: denied { map } for pid=11888 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1076.443895] audit: type=1400 audit(1555924264.311:4532): avc: denied { map } for pid=11888 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1076.564555] audit: type=1400 audit(1555924264.341:4533): avc: denied { map } for pid=11941 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:05 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x10bb, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='statm\x00\x01\xff\x9f\x1f\x94\xc3RA\xa2\xa7\x1f\xc9\x81\x9d@\x85\xed\xf4\x05\xbf\xfe \x97\xa3\xd2\x19\xa4\xac\x9f\x14\xff\x87\x1b\xe1\x17;M\xfda;\xa5\xaeb\vQE\xc4\x82\xb9\xe1\x1fO\x96\"\xa5\xee\xc5\xb5\x04\x13\xae\x14uULo\xad6y<\x88\xcf\x93\xd3(qY\xdb\xb2\x05\x9a\xb2g\xe4\x1at\xad\xa9\xe7\xa1\xc0(') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x0) [ 1076.730687] audit: type=1400 audit(1555924264.361:4535): avc: denied { map } for pid=11888 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1076.895127] audit: type=1400 audit(1555924264.341:4534): avc: denied { map } for pid=11941 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:05 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x200000) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)=0x4000000) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x8083) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0x100010, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, [0xfffffffe]}) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, 0x0) close(r1) ioctl$void(0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) [ 1077.039612] audit: type=1400 audit(1555924264.371:4536): avc: denied { map } for pid=11941 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) poll(&(0x7f0000000140)=[{r1}], 0x1, 0x78) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xffffffffffffffff}) 09:11:06 executing program 0: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0x40000000000000b, &(0x7f0000000100)={0x0, 0x0, 0x3}) read(r2, &(0x7f0000481000)=""/128, 0x80) 09:11:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000340)=[@in={0x2, 0x0, @loopback}], 0x10) 09:11:06 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000240)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x1ffe00) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 09:11:07 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x10bb, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='statm\x00\x01\xff\x9f\x1f\x94\xc3RA\xa2\xa7\x1f\xc9\x81\x9d@\x85\xed\xf4\x05\xbf\xfe \x97\xa3\xd2\x19\xa4\xac\x9f\x14\xff\x87\x1b\xe1\x17;M\xfda;\xa5\xaeb\vQE\xc4\x82\xb9\xe1\x1fO\x96\"\xa5\xee\xc5\xb5\x04\x13\xae\x14uULo\xad6y<\x88\xcf\x93\xd3(qY\xdb\xb2\x05\x9a\xb2g\xe4\x1at\xad\xa9\xe7\xa1\xc0(') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x0) 09:11:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, &(0x7f0000000040)) 09:11:07 executing program 0: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0x40000000000000b, &(0x7f0000000100)={0x0, 0x0, 0x3}) read(r2, &(0x7f0000481000)=""/128, 0x80) 09:11:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'wp512\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x166, &(0x7f0000000000)=[@op={0x18}], 0x1}], 0x49249249249265b, 0x0) 09:11:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000340)=[@in={0x2, 0x0, @loopback}], 0x10) [ 1079.477733] net_ratelimit: 18 callbacks suppressed [ 1079.477742] protocol 88fb is buggy, dev hsr_slave_0 [ 1079.488082] protocol 88fb is buggy, dev hsr_slave_1 [ 1079.493459] protocol 88fb is buggy, dev hsr_slave_0 [ 1079.498697] protocol 88fb is buggy, dev hsr_slave_1 09:11:08 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x10bb, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='statm\x00\x01\xff\x9f\x1f\x94\xc3RA\xa2\xa7\x1f\xc9\x81\x9d@\x85\xed\xf4\x05\xbf\xfe \x97\xa3\xd2\x19\xa4\xac\x9f\x14\xff\x87\x1b\xe1\x17;M\xfda;\xa5\xaeb\vQE\xc4\x82\xb9\xe1\x1fO\x96\"\xa5\xee\xc5\xb5\x04\x13\xae\x14uULo\xad6y<\x88\xcf\x93\xd3(qY\xdb\xb2\x05\x9a\xb2g\xe4\x1at\xad\xa9\xe7\xa1\xc0(') preadv(r0, &(0x7f0000000480), 0x1000000000000269, 0x0) 09:11:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x2fc) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 09:11:08 executing program 0: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0x40000000000000b, &(0x7f0000000100)={0x0, 0x0, 0x3}) read(r2, &(0x7f0000481000)=""/128, 0x80) 09:11:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000340)=[@in={0x2, 0x0, @loopback}], 0x10) [ 1080.277758] protocol 88fb is buggy, dev hsr_slave_0 [ 1080.282896] protocol 88fb is buggy, dev hsr_slave_1 [ 1080.288131] protocol 88fb is buggy, dev hsr_slave_0 [ 1080.293253] protocol 88fb is buggy, dev hsr_slave_1 [ 1080.597767] protocol 88fb is buggy, dev hsr_slave_0 [ 1080.602936] protocol 88fb is buggy, dev hsr_slave_1 [ 1080.642590] kauditd_printk_skb: 88 callbacks suppressed [ 1080.642606] audit: type=1400 audit(1555924269.171:4625): avc: denied { map } for pid=13297 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:09 executing program 0: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0x40000000000000b, &(0x7f0000000100)={0x0, 0x0, 0x3}) read(r2, &(0x7f0000481000)=""/128, 0x80) 09:11:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000240)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000080)=0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1080.765930] audit: type=1400 audit(1555924269.221:4626): avc: denied { map } for pid=13297 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1080.894100] audit: type=1400 audit(1555924269.241:4627): avc: denied { map } for pid=13297 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:09 executing program 5: msgget$private(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4000000020000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0x0, 0x4c00}}, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) 09:11:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000180)={{0x0, 0x0, 0x0, 0x6}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1081.018641] audit: type=1400 audit(1555924269.311:4628): avc: denied { map } for pid=13297 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1081.133108] audit: type=1400 audit(1555924269.321:4629): avc: denied { map } for pid=13297 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:09 executing program 0: mmap(&(0x7f00004ea000/0x1000)=nil, 0x1000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 09:11:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000340)=[@in={0x2, 0x0, @loopback}], 0x10) 09:11:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 1081.522221] audit: type=1400 audit(1555924270.051:4630): avc: denied { map } for pid=13581 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1081.598026] audit: type=1400 audit(1555924270.081:4631): avc: denied { map } for pid=13581 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1081.729037] audit: type=1400 audit(1555924270.081:4632): avc: denied { map } for pid=13581 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1081.848293] audit: type=1400 audit(1555924270.101:4633): avc: denied { map } for pid=13581 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1081.948632] device lo entered promiscuous mode [ 1082.086263] audit: type=1400 audit(1555924270.181:4634): avc: denied { map } for pid=13581 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:10 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "0049d13d339c3a83b57716ee817c892fe57dda6e3ac07858a088ca4db18e363c2dea8bdb564a22c9bc8faf6c532aaab9b6ba0630f11c15b164a12d3e48f3fd"}, 0x60) getsockopt$nfc_llcp(r0, 0x118, 0x0, 0x0, 0x400000) 09:11:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000040)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_AF_SPEC={0x4}]}, 0x2c}}, 0x0) 09:11:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="0a070008000000000008b60c3cfc54db", 0x10) 09:11:11 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$UHID_INPUT(r0, &(0x7f0000001880)={0x8, "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", 0xfffffccf}, 0x7cf) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r2 = dup2(r1, r0) sync_file_range(r2, 0x0, 0x0, 0x7) 09:11:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0xae78, 0x0) [ 1083.377508] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1083.422878] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1083.513651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 09:11:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x40020820000, r0}, 0x2c) [ 1083.568552] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 09:11:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="832c8fff7300000032decc8d40aed55a335da4dd87739551000200000009ff00", 0x20) 09:11:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendto(r2, &(0x7f0000001440)="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", 0x280, 0x20008000, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 09:11:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x16, 0x0, &(0x7f0000000040)=0xde) close(r2) close(r1) 09:11:13 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, 0x0, 0x0) 09:11:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x3e2, 0x20000002, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x2e7) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x8) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x19c) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xfffffffffffffeec) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xffffffffffffff0f) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, 0x0, 0x80000) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1084.757764] net_ratelimit: 22 callbacks suppressed [ 1084.757774] protocol 88fb is buggy, dev hsr_slave_0 [ 1084.767913] protocol 88fb is buggy, dev hsr_slave_1 [ 1084.997747] protocol 88fb is buggy, dev hsr_slave_0 [ 1085.003015] protocol 88fb is buggy, dev hsr_slave_1 09:11:13 executing program 3: mknod(&(0x7f0000000000)='./file0\x00', 0x1124, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a4fd63f61123f319bd070") r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) fcntl$setstatus(r1, 0x4, 0x44400) write$binfmt_aout(r1, &(0x7f00000002c0), 0x20) 09:11:13 executing program 2: syz_emit_ethernet(0xffffffffffffffea, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x2, 0x2d9, 0x3]}) 09:11:13 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x32) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f00000001c0)='./bus\x00') r1 = socket$inet6(0xa, 0x7, 0xfffffffffffffffd) ptrace$pokeuser(0x6, 0x0, 0x7fe, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) remap_file_pages(&(0x7f0000fee000/0xf000)=nil, 0xf000, 0x1, 0x74f, 0x1000) creat(0x0, 0x4) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x3) rmdir(&(0x7f0000000580)='./bus\x00') write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[], 0x0) mkdir(&(0x7f0000000100)='./bus\x00', 0x21) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000440)={0x1, 0x1}, 0x8) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3, 0x1, 0x0, 0x10001}, 0x20) [ 1085.494999] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:11:14 executing program 0: setuid(0xee01) syz_init_net_socket$ax25(0x3, 0x0, 0x0) 09:11:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendto(r2, &(0x7f0000001440)="4f74ad29e788814f82e3148eaaf224f93e60faaa985f48798eb707c28dc22c49b43dd7098a006d5ececd8f24613e29ffefd07bd9691f7bf7d51fc89f330b01c43511b7635d1babc5bf494877e180f9b33ab24646f2f767f2e3a175a6a87e6f57db9f4efe57cfea130d805721a24df08af383e50d442cfc32178a8ea32cb8ce0b28df4b7db7f0879517ee136ed622e4a7066af7c3496f191d5e80ed44c837381c019964b00bd9a78a23c025a9908de9d7e033079a3a1a09131d599e5549495f078959415ad47066c9b9b08ad540b66892be8aa44d517d3cbb1ac102498ceec3b3c9a9b5647f2ebd3b3b0c7d8bb38717961927c99f41c6489e3a4dc83a9561960ae15d8ed40d3c2db71f6fe9330d973376df4de715ded4e0b6396e54393190505c735e5cd96dae155498ad101f1e0aab364977cd2c77ff0ed62280b282bc7f8adb78a768cbcb3543ee6d2f99051fd741431d4f9db482a8405b15627f585107e75aa226ae02e4c00a4abfa09c53f367344f15e5988efbdc92b4b69807bd21205d502b2e88c64e4abbb9c841dbc052b3f98ac8f7a9b2745c201378eafdb5276a9b3def4e11f7e41aca5ca4f03a716a0c2e8664f910cf5ef10b43dafff75061cd1dc6ae2042a8172bbd2bb405301ae355d59fa6391471f600c8e451f9127870e359fe16b6115feb3017e66faa50dcf51b4ba19b808dd5881094d97b7ed7d76365f60374f5b459c50c961cb6fe8c8248bec76edd0d2144d75f5f4f2ac8db0a5d8e19b6298da545845625995746afff08eb37ae1fc817d94bbea5e7dd94781cd949098eed948cede08fef523946ff8db73fcb9cdcd5539a6bb545f5958b7bccda7cb590b7cb79843d03f7c33e2af12a4a750026ba9dd046612c399801c76329161fb1e8", 0x280, 0x20008000, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) [ 1085.658502] kauditd_printk_skb: 80 callbacks suppressed [ 1085.658519] audit: type=1400 audit(1555924274.191:4715): avc: denied { map } for pid=14802 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1085.717738] protocol 88fb is buggy, dev hsr_slave_0 [ 1085.723017] protocol 88fb is buggy, dev hsr_slave_1 [ 1085.728357] protocol 88fb is buggy, dev hsr_slave_0 [ 1085.733920] protocol 88fb is buggy, dev hsr_slave_1 [ 1085.808104] audit: type=1400 audit(1555924274.281:4716): avc: denied { map } for pid=14802 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1085.959747] audit: type=1400 audit(1555924274.331:4717): avc: denied { map } for pid=14802 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1086.086478] audit: type=1400 audit(1555924274.361:4718): avc: denied { map } for pid=14802 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000540)=0x8) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x1b5682, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080)=0x104, 0x4) [ 1086.258442] audit: type=1400 audit(1555924274.421:4719): avc: denied { map } for pid=14802 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x76, &(0x7f0000dcffe8)=""/24, &(0x7f0000000040)=0x164) [ 1086.424065] audit: type=1400 audit(1555924274.421:4720): avc: denied { map } for pid=14802 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1086.517781] protocol 88fb is buggy, dev hsr_slave_0 [ 1086.559552] audit: type=1400 audit(1555924274.531:4721): avc: denied { map } for pid=14802 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x580, 0x4) setsockopt$inet6_int(r2, 0x29, 0x42, &(0x7f00000000c0)=0x7, 0x3e6) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) recvmsg(r2, &(0x7f0000000340)={0x0, 0xff15, 0x0, 0x0, &(0x7f0000000140)=""/36, 0x24}, 0x2164) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000001c, 0x0) [ 1086.719673] audit: type=1400 audit(1555924274.541:4722): avc: denied { map } for pid=14802 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)="2da85b07f7a224ab77ab8a705cc14edf9dc89f455d2e0e8bfe37702b7d0b240e5b7ded616cbe658b8550de8b2817f3da5e030f100e2e9883893c6e62c4387267cd8d9969b213ea72d92284c6c8b4216081bf206420575278f5977f94b725862c012d", 0x62}], 0x1) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1086.867553] audit: type=1400 audit(1555924275.091:4723): avc: denied { map } for pid=15035 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendto(r2, &(0x7f0000001440)="4f74ad29e788814f82e3148eaaf224f93e60faaa985f48798eb707c28dc22c49b43dd7098a006d5ececd8f24613e29ffefd07bd9691f7bf7d51fc89f330b01c43511b7635d1babc5bf494877e180f9b33ab24646f2f767f2e3a175a6a87e6f57db9f4efe57cfea130d805721a24df08af383e50d442cfc32178a8ea32cb8ce0b28df4b7db7f0879517ee136ed622e4a7066af7c3496f191d5e80ed44c837381c019964b00bd9a78a23c025a9908de9d7e033079a3a1a09131d599e5549495f078959415ad47066c9b9b08ad540b66892be8aa44d517d3cbb1ac102498ceec3b3c9a9b5647f2ebd3b3b0c7d8bb38717961927c99f41c6489e3a4dc83a9561960ae15d8ed40d3c2db71f6fe9330d973376df4de715ded4e0b6396e54393190505c735e5cd96dae155498ad101f1e0aab364977cd2c77ff0ed62280b282bc7f8adb78a768cbcb3543ee6d2f99051fd741431d4f9db482a8405b15627f585107e75aa226ae02e4c00a4abfa09c53f367344f15e5988efbdc92b4b69807bd21205d502b2e88c64e4abbb9c841dbc052b3f98ac8f7a9b2745c201378eafdb5276a9b3def4e11f7e41aca5ca4f03a716a0c2e8664f910cf5ef10b43dafff75061cd1dc6ae2042a8172bbd2bb405301ae355d59fa6391471f600c8e451f9127870e359fe16b6115feb3017e66faa50dcf51b4ba19b808dd5881094d97b7ed7d76365f60374f5b459c50c961cb6fe8c8248bec76edd0d2144d75f5f4f2ac8db0a5d8e19b6298da545845625995746afff08eb37ae1fc817d94bbea5e7dd94781cd949098eed948cede08fef523946ff8db73fcb9cdcd5539a6bb545f5958b7bccda7cb590b7cb79843d03f7c33e2af12a4a750026ba9dd046612c399801c76329161fb1e8", 0x280, 0x20008000, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) [ 1086.997756] audit: type=1400 audit(1555924275.091:4724): avc: denied { map } for pid=15035 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:15 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r2, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0x80044323, 0x0) 09:11:16 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ion\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000080)) 09:11:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0x8000, 0x4) write(r1, &(0x7f0000000100)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 09:11:16 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x20000400) unshare(0x24020400) 09:11:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendto(r2, &(0x7f0000001440)="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", 0x280, 0x20008000, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 09:11:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000000)=0xfffffffffffffe2b) 09:11:17 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@name, 0x10) bind$tipc(r0, &(0x7f0000000100)=@name, 0x10) r1 = socket(0x1e, 0x5, 0x0) sendmsg(r1, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 09:11:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0xff00000000000000, 0xf8030000, 0xffffffc5}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248}, 0x48) 09:11:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 09:11:18 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) listxattr(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) 09:11:18 executing program 1: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') [ 1089.877776] net_ratelimit: 19 callbacks suppressed [ 1089.877785] protocol 88fb is buggy, dev hsr_slave_0 [ 1089.888081] protocol 88fb is buggy, dev hsr_slave_1 [ 1089.893362] protocol 88fb is buggy, dev hsr_slave_0 [ 1089.898597] protocol 88fb is buggy, dev hsr_slave_1 09:11:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 09:11:19 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x2102801ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x400000, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0xa00000000, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000000)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 09:11:19 executing program 3: r0 = memfd_create(&(0x7f0000000280)='#g\x04\x00\x00\x00\x10r\xe9\xdf\xb1\xb9a\xb7\x11\x98\xdb\xabT\xf0\xd4#\xc8\xcfr\xe2 \xfe\x15\xd2G\xa4\xf1\xb7\xd27\xe0N\x11\x86i\x80\xaeI\x9b\xcfAd8\x03\x11O9\xe7!8\x82\xeag!\xb6\xbb\x06\xc0P\x99L', 0x0) write(r0, &(0x7f0000000480)='$', 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x26) 09:11:19 executing program 5: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000002140)="004dde0301b3d8a52150dbf7f3649aa4a133b1b47392870e2defc66e389f1912e8d05566b4faa7040cc60d103d385210cae9cc0804628a83533410d5996991644a3fe726a1063c39e41d570890b0d9256e0b19698ef7213a67bcfc7af200080000f071991224ad9524b280b9fa224a833ea0cc3c5a51d5d20acd5aa3a5926c8079170000000000000000000000000054db45165107b9c877a83a6bfaf6f33a59150445c45cc59c3a967d69bd8ecb5724a39784673c37c977e61cc6b3e20cd4f9", 0xc0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f00000001c0)="bc", 0x1, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000440)={r1, r0, r0}, &(0x7f0000000240)=""/92, 0x5c, &(0x7f0000000200)={&(0x7f0000000100)={'sha512-generic\x00'}}) [ 1090.677753] protocol 88fb is buggy, dev hsr_slave_0 [ 1090.682891] protocol 88fb is buggy, dev hsr_slave_1 [ 1090.688148] protocol 88fb is buggy, dev hsr_slave_0 [ 1090.693252] protocol 88fb is buggy, dev hsr_slave_1 [ 1090.708947] kauditd_printk_skb: 75 callbacks suppressed [ 1090.708964] audit: type=1400 audit(1555924279.241:4800): avc: denied { map } for pid=16084 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1090.864349] audit: type=1400 audit(1555924279.281:4801): avc: denied { map } for pid=16084 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1090.997755] protocol 88fb is buggy, dev hsr_slave_0 [ 1091.002899] protocol 88fb is buggy, dev hsr_slave_1 [ 1091.049108] audit: type=1400 audit(1555924279.331:4802): avc: denied { map } for pid=16084 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:19 executing program 4: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000100)) 09:11:19 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$rose(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, 0x0, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) listen(r0, 0xffffffff) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3ec, @loopback, 0xe803000000000000}], 0x1c) [ 1091.229242] audit: type=1400 audit(1555924279.361:4803): avc: denied { map } for pid=16084 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1091.347809] audit: type=1400 audit(1555924279.771:4804): avc: denied { map } for pid=16391 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:20 executing program 1: r0 = epoll_create1(0x0) flock(r0, 0x2) r1 = epoll_create1(0x0) flock(r1, 0x1) r2 = gettid() dup2(r0, r1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) [ 1091.451497] audit: type=1400 audit(1555924279.781:4805): avc: denied { map } for pid=16391 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1091.546496] audit: type=1400 audit(1555924279.801:4806): avc: denied { map } for pid=16391 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1091.699439] audit: type=1400 audit(1555924279.821:4807): avc: denied { map } for pid=16391 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1091.916290] audit: type=1400 audit(1555924279.891:4808): avc: denied { map } for pid=16391 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:20 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa04, &(0x7f0000000280)={{&(0x7f0000000000/0x600000)=nil, 0x600000}, 0x2}) [ 1092.078023] audit: type=1400 audit(1555924279.951:4809): avc: denied { map } for pid=16391 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x5, 0x4) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) 09:11:21 executing program 0: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) poll(&(0x7f00000001c0)=[{r1}], 0x1, 0x4) 09:11:21 executing program 2: prlimit64(0x0, 0x7, &(0x7f0000000280)={0x0, 0x7fff}, &(0x7f00000002c0)) 09:11:21 executing program 4: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00000000c0)) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, 0x0) 09:11:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x2, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = dup2(r1, r2) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r4, 0x0, r3, 0x0, 0xffffffff, 0x0) 09:11:22 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa04, &(0x7f0000000280)={{&(0x7f0000000000/0x600000)=nil, 0x600000}, 0x2}) 09:11:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f00000006c0)={0x44, r1, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x8, 0x2}]}]}, 0x44}}, 0x0) 09:11:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2e}}, {{@in=@multicast2, 0x0, 0xff}, 0x0, @in6=@mcast1}}, 0xe8) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x3c, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=@gettfilter={0x24, 0x2e, 0x1}, 0x24}}, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000000c0)=""/66, 0x18}, {&(0x7f0000001a80)=""/4096, 0x1000}], 0x2}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)={0x14, 0x42, 0x105}, 0xfe}}, 0x0) 09:11:23 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa04, &(0x7f0000000280)={{&(0x7f0000000000/0x600000)=nil, 0x600000}, 0x2}) 09:11:23 executing program 4: creat(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$VIDIOC_ENUMSTD(0xffffffffffffffff, 0xc0485619, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000140)=0x8000000000009) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f00000001c0)=""/213) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 09:11:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28f8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1095.157753] net_ratelimit: 22 callbacks suppressed [ 1095.157763] protocol 88fb is buggy, dev hsr_slave_0 [ 1095.167920] protocol 88fb is buggy, dev hsr_slave_1 09:11:23 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2000205, 0x32, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000200)=[{}], 0x1, 0x0) [ 1095.397894] protocol 88fb is buggy, dev hsr_slave_0 [ 1095.403179] protocol 88fb is buggy, dev hsr_slave_1 09:11:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") getsockopt$sock_buf(r0, 0x1, 0x26, &(0x7f0000e530e9)=""/16, &(0x7f0000000080)=0x10) 09:11:24 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa04, &(0x7f0000000280)={{&(0x7f0000000000/0x600000)=nil, 0x600000}, 0x2}) [ 1095.784691] kauditd_printk_skb: 80 callbacks suppressed [ 1095.784707] audit: type=1400 audit(1555924284.311:4890): avc: denied { map } for pid=17764 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1096.000397] audit: type=1400 audit(1555924284.441:4891): avc: denied { map } for pid=17764 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) getpgid(0xffffffffffffffff) keyctl$update(0x2, 0x0, 0x0, 0x0) 09:11:24 executing program 3: setrlimit(0x40000000000008, &(0x7f0000000000)) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) [ 1096.117742] protocol 88fb is buggy, dev hsr_slave_0 [ 1096.122998] protocol 88fb is buggy, dev hsr_slave_1 [ 1096.128364] protocol 88fb is buggy, dev hsr_slave_0 [ 1096.133561] protocol 88fb is buggy, dev hsr_slave_1 [ 1096.159369] audit: type=1400 audit(1555924284.451:4892): avc: denied { map } for pid=17764 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1096.355276] audit: type=1400 audit(1555924284.521:4893): avc: denied { map } for pid=17764 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") get_robust_list(0x0, 0x0, &(0x7f0000000280)) 09:11:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000680)="23000000220081aee4050c00000f00008100a30000ffffff9e8b1832e0b58bc609f6d8", 0x23}], 0x1}, 0x0) [ 1096.517731] audit: type=1400 audit(1555924284.531:4894): avc: denied { map } for pid=17764 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x8000000001, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) connect$inet6(r1, &(0x7f0000000280), 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000080)={0x0, "438d9adf69bb9d68019a254c31953d1fefa706746956bc5131f1c884de133114"}) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 1096.700517] audit: type=1400 audit(1555924284.601:4895): avc: denied { map } for pid=17764 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1096.839097] audit: type=1400 audit(1555924284.611:4896): avc: denied { map } for pid=17863 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1096.917752] protocol 88fb is buggy, dev hsr_slave_0 [ 1096.923068] protocol 88fb is buggy, dev hsr_slave_1 [ 1096.925202] audit: type=1400 audit(1555924284.611:4897): avc: denied { map } for pid=17863 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1097.100277] audit: type=1400 audit(1555924284.611:4898): avc: denied { map } for pid=17863 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1097.285921] audit: type=1400 audit(1555924284.611:4899): avc: denied { map } for pid=17863 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:25 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) 09:11:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 09:11:26 executing program 3: socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xc000}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001400)='/dev/net/tun\x00', 0x105000, 0x0) 09:11:26 executing program 5: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) io_setup(0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00000000c0)) syz_open_pts(0xffffffffffffffff, 0x80000000006) dup2(r2, r1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) ptrace$setopts(0x4206, r4, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) clone(0x8102000, 0x0, 0x0, 0x0, 0x0) 09:11:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040), 0x1de8a4721cec8d6b) 09:11:27 executing program 4: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2403, 0x0) 09:11:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2000000000000023) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="a92f0474020053a2335325353b2a3c58e30d31010079dd2d0bb2263a63f80d6f84dd4ccdf0a3d725d234bdc8f26e6b29b129e8773ff1f347d1"], 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r1, 0x0, 0x0) 09:11:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xffffffffffffffff}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='timers\x00') preadv(r0, &(0x7f00000017c0), 0x1be, 0x700) 09:11:27 executing program 5: setresgid(0x0, 0xee00, 0x0) r0 = getegid() setresgid(0x0, 0x0, 0x0) setregid(r0, r0) 09:11:28 executing program 1: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc004ec, 0x1, 0x0, 0x0, 0x2000000000002) 09:11:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = memfd_create(&(0x7f0000000500)='%\x00', 0x0) ftruncate(r1, 0x0) close(r1) 09:11:28 executing program 0: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='mode=40000000000']) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) 09:11:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x7fffffff) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r1) sendfile(r0, r0, &(0x7f0000000140), 0x8800000) [ 1100.277731] net_ratelimit: 18 callbacks suppressed [ 1100.277740] protocol 88fb is buggy, dev hsr_slave_0 [ 1100.288070] protocol 88fb is buggy, dev hsr_slave_1 [ 1100.293357] protocol 88fb is buggy, dev hsr_slave_0 [ 1100.298603] protocol 88fb is buggy, dev hsr_slave_1 09:11:28 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000140)={0x990000, 0x0, 0x0, [], 0x0}) 09:11:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, r0) keyctl$link(0x8, r0, r1) [ 1101.077744] protocol 88fb is buggy, dev hsr_slave_0 [ 1101.082961] protocol 88fb is buggy, dev hsr_slave_1 [ 1101.088188] protocol 88fb is buggy, dev hsr_slave_0 [ 1101.093293] protocol 88fb is buggy, dev hsr_slave_1 [ 1101.133007] kauditd_printk_skb: 74 callbacks suppressed [ 1101.133023] audit: type=1400 audit(1555924289.661:4974): avc: denied { map } for pid=19553 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1101.205140] hugetlbfs: Bad value '40000000000' for mount option 'mode=40000000000' [ 1101.329727] audit: type=1400 audit(1555924289.661:4975): avc: denied { map } for pid=19553 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1101.397814] protocol 88fb is buggy, dev hsr_slave_0 [ 1101.403037] protocol 88fb is buggy, dev hsr_slave_1 [ 1101.490554] audit: type=1400 audit(1555924289.671:4976): avc: denied { map } for pid=19548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x25, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x10) [ 1101.764407] audit: type=1400 audit(1555924289.671:4977): avc: denied { map } for pid=19548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x8000) write$binfmt_misc(r0, &(0x7f0000000100)={'z0z0'}, 0xffeb) 09:11:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00009f2000)={0x0, 0x0, &(0x7f0000226000)={&(0x7f00008bc000)={0x24, 0x18, 0x2ff, 0x0, 0x0, {0xa, 0x0, 0x4b9}, [@typed={0x8, 0x0, @u32}, @typed={0x8, 0x2, @u32}]}, 0x24}}, 0x0) [ 1101.892002] audit: type=1400 audit(1555924289.701:4978): avc: denied { map } for pid=19553 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1101.916383] audit: type=1400 audit(1555924289.701:4979): avc: denied { map } for pid=19553 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1101.940546] audit: type=1400 audit(1555924289.701:4980): avc: denied { map } for pid=19548 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1101.964594] audit: type=1400 audit(1555924289.711:4981): avc: denied { map } for pid=19548 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1101.988498] audit: type=1400 audit(1555924289.751:4982): avc: denied { map } for pid=19548 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1102.011121] audit: type=1400 audit(1555924289.781:4983): avc: denied { map } for pid=19548 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:30 executing program 0: r0 = socket$inet(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 09:11:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = getgid() syz_mount_image$msdos(&(0x7f0000000240)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='nodots,gid=', @ANYRESHEX=r1]) 09:11:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) 09:11:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000280)={0x0, 0x0, 0xb, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000040)="6b04ab6b2b10d7eca2920a", 0x0, 0x0, 0x20, 0x2, 0x0}) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(0xffffffffffffffff, 0xc008551b, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x3ffff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:11:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x540e, 0x0) 09:11:32 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, &(0x7f0000000080)) 09:11:32 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x802102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000080)='\xdd-ppp0,,vboxnet1-\x00') 09:11:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = dup2(r1, r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000680)={0x11, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0463044000000000086310400000000080"], 0x0, 0x0, 0x0}) 09:11:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x8000) write$binfmt_misc(r0, &(0x7f0000000100)={'z0z0'}, 0xffeb) 09:11:32 executing program 2: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000280)=""/91, 0x5b}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 1104.415179] NFS: bad mount option value specified: vboxnet1- 09:11:33 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/unix\x00') sendfile(r0, r3, 0x0, 0x800000bf) 09:11:33 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000180)) [ 1104.656861] binder: 20657:20695 BC_INCREFS_DONE u0000008000000000 no match 09:11:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x8000) write$binfmt_misc(r0, &(0x7f0000000100)={'z0z0'}, 0xffeb) 09:11:33 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1\x05\x00\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\xe4\x00\x00\x00\x00\x00\x00\x00h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 09:11:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) capset(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getuid() fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 09:11:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = dup2(r1, r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000680)={0x11, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0463044000000000086310400000000080"], 0x0, 0x0, 0x0}) [ 1105.557802] net_ratelimit: 22 callbacks suppressed [ 1105.557811] protocol 88fb is buggy, dev hsr_slave_0 [ 1105.568169] protocol 88fb is buggy, dev hsr_slave_1 09:11:34 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000180)) [ 1105.797781] protocol 88fb is buggy, dev hsr_slave_0 [ 1105.803038] protocol 88fb is buggy, dev hsr_slave_1 [ 1106.153448] kauditd_printk_skb: 67 callbacks suppressed [ 1106.153464] audit: type=1400 audit(1555924294.681:5051): avc: denied { map } for pid=20994 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1106.320228] audit: type=1400 audit(1555924294.731:5052): avc: denied { map } for pid=20994 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:35 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x6558, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, 0x0) [ 1106.517849] protocol 88fb is buggy, dev hsr_slave_0 [ 1106.523084] protocol 88fb is buggy, dev hsr_slave_1 [ 1106.528386] protocol 88fb is buggy, dev hsr_slave_0 [ 1106.533667] protocol 88fb is buggy, dev hsr_slave_1 [ 1106.571587] audit: type=1400 audit(1555924294.841:5053): avc: denied { map } for pid=21052 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1106.713471] binder: 21073:21104 BC_INCREFS_DONE u0000008000000000 no match [ 1106.728300] audit: type=1400 audit(1555924294.891:5054): avc: denied { map } for pid=21052 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:35 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000180)) 09:11:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x8000) write$binfmt_misc(r0, &(0x7f0000000100)={'z0z0'}, 0xffeb) [ 1106.839684] audit: type=1400 audit(1555924294.941:5055): avc: denied { map } for pid=21052 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = dup2(r1, r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000680)={0x11, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0463044000000000086310400000000080"], 0x0, 0x0, 0x0}) 09:11:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() getsockopt$inet_int(r1, 0x0, 0x100000000000001, 0x0, &(0x7f0000000000)=0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x27) fcntl$setstatus(r0, 0x4, 0x42801) [ 1107.020020] audit: type=1400 audit(1555924294.941:5056): avc: denied { map } for pid=21052 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1107.184997] audit: type=1400 audit(1555924295.041:5057): avc: denied { map } for pid=21052 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1107.317750] protocol 88fb is buggy, dev hsr_slave_0 [ 1107.322920] protocol 88fb is buggy, dev hsr_slave_1 [ 1107.359368] audit: type=1400 audit(1555924295.131:5058): avc: denied { map } for pid=21052 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:36 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x2) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) [ 1107.538277] audit: type=1400 audit(1555924295.141:5059): avc: denied { map } for pid=21052 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1107.607981] audit: type=1400 audit(1555924295.191:5060): avc: denied { map } for pid=21052 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = memfd_create(0x0, 0x0) pwrite64(r1, &(0x7f0000000140)="e6d52139f022", 0x6, 0x0) sendfile(r1, r1, 0x0, 0x7f8) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000390000)={0x2, 0x0, @local}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141046, 0x0) ftruncate(r3, 0x10004) sendfile(r2, r3, 0x0, 0x72439a6b) 09:11:36 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000180)) 09:11:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x415, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0x0, 0x0) 09:11:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = dup2(r1, r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000680)={0x11, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0463044000000000086310400000000080"], 0x0, 0x0, 0x0}) 09:11:37 executing program 2: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 09:11:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) r0 = memfd_create(&(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000080)="a85883", 0x3) sendfile(r0, r0, &(0x7f0000317000), 0xff8) 09:11:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000400)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) close(r0) accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) 09:11:38 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2e) tkill(r0, 0x29) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1) [ 1109.622576] binder: 21713:21752 BC_INCREFS_DONE u0000008000000000 no match 09:11:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00\xd3\xf4=\xf9\xe5\xcc\xe5\x1c\x95\x92\xead\x1a\xcf\x98G\xfa\x82\xba\xe38\xe7D\xe2\x05\xa7\x99\xe2\xec\n\xb6NUc\xc1\xba\xbaa\xf4\xf1\xd5a\xf4\xbe\x03\xf11/\x01\x00\x01\x00&\xda0\xe4\x12\xa0\xbc\"e\x10\x95Q\x1d\xfc\xa2U\x1b\xc8\x00W\x82\xd8\xff;\'\xf7d\x13\x04\x82\xa9\xc7\xe8\xec\xa9\xeax\x06\xc3|\x11\xf5%\x1f\xc8\x9b&\x8fyUVu\xc4Q\xda\xd9\xfax\x91c\x9f\xcd\r=\xb6?\f\xfb(\xb8\x97,\xbb%R\a\xdb\xfb\xfe\xde9\x8e\x14\x00\x01\x997&u%T\xf5[\x92\x98P\b$\xd30\r\x16#\xca') ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$void(r0, 0xc0045878) 09:11:38 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000040)="ffff01003c123f319bd070") r1 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) 09:11:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="de75e1fe7d087634b214a3765ba0017995103a08917fc2a1", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x1}}, 0x0) 09:11:39 executing program 2: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 1110.677746] net_ratelimit: 18 callbacks suppressed [ 1110.677756] protocol 88fb is buggy, dev hsr_slave_0 [ 1110.688093] protocol 88fb is buggy, dev hsr_slave_1 [ 1110.693411] protocol 88fb is buggy, dev hsr_slave_0 [ 1110.698672] protocol 88fb is buggy, dev hsr_slave_1 09:11:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000ffc)=0x9, 0x4) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000ffc)=0x4) 09:11:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_GET_IRQCHIP(r2, 0xc048ae65, 0x0) [ 1111.202504] kauditd_printk_skb: 84 callbacks suppressed [ 1111.202520] audit: type=1400 audit(1555924299.731:5145): avc: denied { map } for pid=22163 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1111.364002] audit: type=1400 audit(1555924299.731:5146): avc: denied { map } for pid=22163 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1111.477756] protocol 88fb is buggy, dev hsr_slave_0 [ 1111.482888] protocol 88fb is buggy, dev hsr_slave_1 [ 1111.488145] protocol 88fb is buggy, dev hsr_slave_0 [ 1111.493250] protocol 88fb is buggy, dev hsr_slave_1 [ 1111.526585] audit: type=1400 audit(1555924299.791:5147): avc: denied { map } for pid=22163 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1111.663828] audit: type=1400 audit(1555924299.791:5148): avc: denied { map } for pid=22163 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:40 executing program 2: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 09:11:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f00000003c0)={0x0, 0xfffffffd, 0x2, {0x2, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0x96000]}}}) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc058560f, &(0x7f0000000100)={0x0, 0x2, 0x0, {0x0, @raw_data="2085f3072c9b42f03f10be83b68ebcf014a0409fdf8be3d3e82c747c7f79f7cee00b443f02000000a91ca25441677d169fb75a152d6eebf4bef6c96076d67f243aebaac6430c9ef1a788e60eb3d0a7c29a5e3416871c8a51df55701a05e0a2f09883c482efaf6dc9e1695038733a23bbf0faf76a1d3fae5c251c4fad507b2ead2f1581057e3f84f3e8503ee570d8069eb53a897d2dd5f3d89629917fb171132181e9f3c510ac5229a6b6096547977578c5795d84cf23fe1d042df97dbd37a4b3d0e338a1b611e3ae"}, [0x0, 0x0, 0x0, 0x7000000]}) [ 1111.797752] protocol 88fb is buggy, dev hsr_slave_0 [ 1111.802890] protocol 88fb is buggy, dev hsr_slave_1 [ 1111.808092] audit: type=1400 audit(1555924299.891:5149): avc: denied { map } for pid=22163 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:40 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000000200)={0x0, 0x1f, 0x100000, 0x0}) [ 1111.951827] audit: type=1400 audit(1555924299.991:5150): avc: denied { map } for pid=22163 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:40 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) [ 1112.095124] audit: type=1400 audit(1555924299.991:5151): avc: denied { map } for pid=22163 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1112.257328] audit: type=1400 audit(1555924300.111:5152): avc: denied { map } for pid=22163 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1112.398022] audit: type=1400 audit(1555924300.111:5153): avc: denied { map } for pid=22163 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1112.532714] audit: type=1400 audit(1555924300.231:5154): avc: denied { map } for pid=22352 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:41 executing program 2: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 09:11:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c1248319bd070") r1 = socket(0x10, 0x80002, 0x0) sendmsg(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="5500000018007f5300fe01b2a4a280930a06000000a84308910000003900080008000c00010000000000156f757284366a660006000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000", 0x55}], 0x1}, 0x0) 09:11:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='cgroup.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x10, 0x0, 0x49) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 09:11:41 executing program 0: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x61c0) syz_open_procfs(0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)={0x1}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 09:11:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'hash\x00', 0x0, 0x0, 'tgr192-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) sendfile(r1, r2, 0x0, 0x10000000000443) 09:11:42 executing program 2: socket$packet(0x11, 0x2, 0x300) creat(&(0x7f0000000000)='./file0\x00', 0x40) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e20, @empty}, 0x10) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff04, 0x420ffe0, 0x0, 0x37) [ 1113.715564] IPv6: Can't replace route, no match found 09:11:42 executing program 4: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') r0 = syz_open_dev$dspn(0x0, 0x5, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000040)) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000540)) 09:11:42 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000313000/0x1000)=nil, 0x20313000, 0x0, 0x0, 0x0) 09:11:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket(0x10, 0x3, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write(r1, 0x0, 0x0) write(r1, &(0x7f00000001c0)="2400000058001f00ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 09:11:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040)={0x5, 0x9, 0x80, 0x0, 0x80, 0x3, 0x1}, 0xc) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x0, 0x80000018000}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff53, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:11:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 09:11:43 executing program 5: clone(0x200000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$getsig(0x420b, r1, 0x8, 0x0) 09:11:44 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x5}, 0x8) close(r0) [ 1115.957743] net_ratelimit: 22 callbacks suppressed [ 1115.957751] protocol 88fb is buggy, dev hsr_slave_0 [ 1115.968001] protocol 88fb is buggy, dev hsr_slave_1 09:11:44 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1116.197758] protocol 88fb is buggy, dev hsr_slave_0 [ 1116.203003] protocol 88fb is buggy, dev hsr_slave_1 09:11:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0xffffffc0) ioctl$TCFLSH(r0, 0x541b, 0x0) [ 1116.262984] kauditd_printk_skb: 94 callbacks suppressed [ 1116.263001] audit: type=1400 audit(1555924304.791:5249): avc: denied { map } for pid=23472 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x2c, 0x32, 0x829, 0x0, 0x0, {0x4, 0x40000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0x40000000b000000}}]}]}, 0x2c}}, 0x0) [ 1116.431173] audit: type=1400 audit(1555924304.831:5250): avc: denied { map } for pid=23472 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x00\x00\x00\xbb\xa4\x00', &(0x7f0000000080)=@ethtool_cmd={0x1}}) [ 1116.795396] audit: type=1400 audit(1555924305.321:5251): avc: denied { map } for pid=23758 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1116.917750] protocol 88fb is buggy, dev hsr_slave_0 [ 1116.919710] audit: type=1400 audit(1555924305.341:5252): avc: denied { map } for pid=23758 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1116.922997] protocol 88fb is buggy, dev hsr_slave_1 [ 1116.950605] protocol 88fb is buggy, dev hsr_slave_0 [ 1116.955801] protocol 88fb is buggy, dev hsr_slave_1 09:11:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx2\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x4}], 0x18}], 0x4924924924925ac, 0x0) [ 1117.137966] audit: type=1400 audit(1555924305.371:5253): avc: denied { map } for pid=23758 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1117.287858] audit: type=1400 audit(1555924305.381:5254): avc: denied { map } for pid=23758 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1117.388853] openvswitch: netlink: Duplicate key (type 0). 09:11:46 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) write(r2, &(0x7f00000000c0)='\a', 0x1) recvmmsg(r0, &(0x7f0000001000), 0x3fffffffffffefe, 0x0, 0x0) [ 1117.507052] audit: type=1400 audit(1555924305.511:5255): avc: denied { map } for pid=23758 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:46 executing program 2: r0 = socket$inet(0x2, 0x800080001, 0x84) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000040)="f0", 0x1}], 0x1) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="e0", 0x1}], 0x1}, 0x0) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 1117.660050] audit: type=1400 audit(1555924305.571:5256): avc: denied { map } for pid=23758 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1117.727762] protocol 88fb is buggy, dev hsr_slave_0 [ 1117.815464] audit: type=1400 audit(1555924305.591:5257): avc: denied { map } for pid=23758 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:46 executing program 1: close(0xffffffffffffffff) socket(0x0, 0x0, 0x0) removexattr(0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000002c0)={0x0, 0x70, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8, 0x0, 0x800, 0x9c, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x8, 0x2, 0x7, 0x2, 0x0, 0x1f}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x2, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000100)="f3e100def9575cc3b7d991d6734e4e73224a460f30096ccc2e67660e50e94d00c9c966440f38082173294ad0d26c4507c422f18cf0bf420fae9972b571b99f01467785fb") bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x902, 0x70bd2d, 0x25dfdbff}, 0x1c}}, 0x40081) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 09:11:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x21000008912, &(0x7f0000000080)="0adc1f1a3c123f319bd070") sendto$inet(r0, 0x0, 0x0, 0x97cb06ebee444840, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRESOCT], 0x321) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f00000001c0)=""/174, 0xae}, {&(0x7f0000000280)=""/147, 0x93}, {&(0x7f0000000340)=""/186, 0xba}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f0000000880)=""/194, 0xc2}, {&(0x7f0000000980)=""/179, 0xb3}, {&(0x7f0000000a40)=""/229, 0xe5}, {&(0x7f0000000b40)=""/236, 0xec}], 0x8, &(0x7f0000000cc0)=""/109, 0x6d}, 0x6}, {{&(0x7f0000000d40)=@hci, 0x80, &(0x7f0000002280)=[{&(0x7f0000000dc0)=""/187, 0xbb}, {&(0x7f0000000e80)=""/65, 0x41}, {&(0x7f0000000f00)=""/211, 0xd3}, {&(0x7f0000001000)=""/228, 0xe4}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000001100)=""/71, 0x47}, {&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000002180)=""/215, 0xd7}], 0x8, &(0x7f0000002300)=""/27, 0x1b}, 0x2}, {{&(0x7f0000002340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f00000024c0)=[{&(0x7f00000023c0)=""/100, 0x64}, {&(0x7f0000002440)=""/118, 0x76}], 0x2, &(0x7f0000002500)=""/220, 0xdc}, 0x1}, {{&(0x7f0000002600)=@x25, 0x80, &(0x7f0000002880)=[{&(0x7f0000002680)=""/71, 0x47}, {&(0x7f0000002700)=""/228, 0xe4}, {&(0x7f0000002800)=""/91, 0x5b}], 0x3, &(0x7f00000028c0)=""/4096, 0x1000}}, {{&(0x7f00000038c0)=@nfc, 0x80, &(0x7f0000003b00)=[{&(0x7f0000003940)=""/201, 0xc9}, {&(0x7f0000003a40)=""/131, 0x83}], 0x2}, 0x8}], 0x5, 0x60, &(0x7f0000003c80)={0x77359400}) sendto$inet(r0, &(0x7f00000005c0)="03f4a2c970de1d9c3776a9481255ced5dbc57fe63cd931916a02bae17f7850aea473b1c2395dcc0f572febcadeb7fa0f2ee9dc78ccc69169ccfc0bf46dbaba25f3f5a75b77654c0cb9989ea026da080991348232bc2541328a29ec7e06942980144d2ae1b8811ef7af232c4bcb7d89d1aafda6e27d68ed8047debe4f6acdb39851142538045af7a37276d45101a908acd7e6586aaa477a1ed765207d078f68d3f09646ebb175b64f48673bab39a740b280f8876953befe1c9eb8b1494786cdda1a87dbce11989c23041ee13071a5af0e17e267cc0bf8e310b695e5f3bf0f5e0a5ba3393a682e7d0cc9a93e2c8faa4f71f684e0ac9feb65e2a8cb931b4bc84551fe3bc41bdd5d148b8b366152e78e76a6b4bf34f883b99166fc25192d0ea28755cd248b191b5951e5e9ec835e6346d71f731b28e9ad931c763aa39e5da99743f9456069cc9b68fe6eddab20e52fa3d53cf8185941cfbb80fd2dfe9725864a087c899226425347602b7410d8c069f1e39936f9239cd4d7079f129fb5b4d760a4b2177e7ccc63f264b1c67373615d9eebcf66d939d1", 0x194, 0x8c, 0x0, 0x0) 09:11:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)) [ 1117.991567] audit: type=1400 audit(1555924305.651:5258): avc: denied { map } for pid=23807 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000008ce4ccff0000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xc, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x27}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f0000000180)="d7dbb23babc6f7d84ff4dfb4c7fc", 0x0}, 0x28) 09:11:47 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x11, 0x106, 0x0) r3 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PPPIOCSCOMPRESS(r4, 0x4010744d) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000340)) r5 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) connect$llc(r5, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r5, &(0x7f0000001380), 0x3c2, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r2) r6 = dup3(0xffffffffffffffff, r5, 0x80000) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000240)) ioctl$TIOCGWINSZ(r6, 0x5413, &(0x7f00000002c0)) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x200) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x2, 0x20200) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) dup2(r0, r1) 09:11:48 executing program 2: unshare(0x4000400) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 09:11:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x77, 0x0, [0x4b564d02, 0x3]}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000280)=0x5) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:11:48 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = accept(r0, &(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x80) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) connect$netlink(r1, &(0x7f0000000240)=@proc={0x10, 0x0, 0x25dfdbfe, 0x20}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 09:11:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000003000)={0x3, 0x0, 0x400000, 0x0, 0x10020000000, 0x0}, 0x2c) 09:11:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x2fb, 0x20000003, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x64a6) 09:11:49 executing program 4: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000140)=0x2, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 09:11:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x35}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) 09:11:49 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000100)=r1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f00000000c0)=""/10, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000580)={0x0, 0x1, 0x0, &(0x7f0000000140)=""/118, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) [ 1121.077724] net_ratelimit: 19 callbacks suppressed [ 1121.077734] protocol 88fb is buggy, dev hsr_slave_0 [ 1121.088055] protocol 88fb is buggy, dev hsr_slave_1 [ 1121.093334] protocol 88fb is buggy, dev hsr_slave_0 [ 1121.098530] protocol 88fb is buggy, dev hsr_slave_1 09:11:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') [ 1121.756007] kauditd_printk_skb: 97 callbacks suppressed [ 1121.756023] audit: type=1400 audit(1555924310.281:5356): avc: denied { map } for pid=25429 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1121.887747] protocol 88fb is buggy, dev hsr_slave_0 [ 1121.892883] protocol 88fb is buggy, dev hsr_slave_1 [ 1121.898121] protocol 88fb is buggy, dev hsr_slave_0 [ 1121.903241] protocol 88fb is buggy, dev hsr_slave_1 [ 1122.000020] audit: type=1400 audit(1555924310.301:5357): avc: denied { map } for pid=25429 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:50 executing program 3: r0 = socket$inet(0x2, 0x801, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000), 0x4) [ 1122.161212] audit: type=1400 audit(1555924310.311:5358): avc: denied { map } for pid=25429 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1122.197747] protocol 88fb is buggy, dev hsr_slave_0 [ 1122.202866] protocol 88fb is buggy, dev hsr_slave_1 [ 1122.256562] audit: type=1400 audit(1555924310.321:5359): avc: denied { map } for pid=25429 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1122.303980] audit: type=1400 audit(1555924310.341:5360): avc: denied { map } for pid=25429 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1122.435043] audit: type=1400 audit(1555924310.361:5361): avc: denied { map } for pid=25429 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:51 executing program 5: socket$inet6(0xa, 0x1, 0x0) 09:11:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'ip_vti0\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'veth0\x00', 0x3fc}) [ 1122.612510] audit: type=1400 audit(1555924310.361:5362): avc: denied { map } for pid=25429 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:51 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) recvmmsg(r0, &(0x7f00000016c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000180)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) 09:11:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r2 = dup(r1) read(r2, &(0x7f0000001900)=""/4096, 0xfec5) 09:11:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) setsockopt$sock_linger(r1, 0x1, 0xe, &(0x7f00000000c0)={0xfffffffffffffffc}, 0x8) [ 1122.787786] audit: type=1400 audit(1555924310.391:5363): avc: denied { map } for pid=25429 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1122.907721] audit: type=1400 audit(1555924310.391:5364): avc: denied { map } for pid=25429 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1123.032671] audit: type=1400 audit(1555924310.421:5365): avc: denied { map } for pid=25429 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="11634840000000000000000000000000002ff76d7f00000000000000000000000000000000000000000000000000000000f276e8db10496c90e6d59753ae88b0a9999274bc017ae040d53923"], 0x0, 0x0, 0x0}) [ 1123.699847] sock: process `syz-executor.1' is using obsolete setsockopt SO_BSDCOMPAT 09:11:52 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 09:11:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x0, 0x1}, 0x1c) 09:11:52 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) lstat(0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x2000000, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0b"]) chdir(&(0x7f0000000380)='./file0\x00') write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') getpeername$ax25(r0, 0x0, 0x0) acct(&(0x7f00000000c0)='./file1\x00') lgetxattr(&(0x7f0000000080)='./file1/file1\x00', 0x0, 0x0, 0x0) 09:11:52 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) mbind(&(0x7f0000010000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x1) 09:11:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x17f) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040), 0xab95a) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @multicast2, @empty}, 0xc) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x28) fcntl$setstatus(r1, 0x4, 0x42801) 09:11:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e24, 0x10000000000000, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 09:11:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) close(r1) 09:11:54 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 09:11:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) write(r0, &(0x7f00000001c0)="d6", 0x1) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c1241319bd070") ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000300)={0x12}) 09:11:54 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000100)="ca2110874190288ce1c433361f4b29b6514c2580dacf09440e319725134454f88e01b43df9c8b817980d95f77c8842721019d5179cb043c9c74870968fdde0203b1d171b15960bc72245620164111fe98fdd664a9eea0d4367c6b5a4a1aafaea6ee774ac3065f583b0505f0ee2aa8f28cc40732e9ab91cc3"}, 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x100003f00}, 0x2c) 09:11:54 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x2a) 09:11:54 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009374, &(0x7f0000000440)="a50df8525a92d55c3865") [ 1126.357791] net_ratelimit: 22 callbacks suppressed [ 1126.357801] protocol 88fb is buggy, dev hsr_slave_0 [ 1126.367926] protocol 88fb is buggy, dev hsr_slave_1 [ 1126.597747] protocol 88fb is buggy, dev hsr_slave_0 [ 1126.602988] protocol 88fb is buggy, dev hsr_slave_1 09:11:55 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCSMRU(r0, 0x40047452, 0x0) [ 1126.954442] kauditd_printk_skb: 90 callbacks suppressed [ 1126.954458] audit: type=1400 audit(1555924315.481:5456): avc: denied { map } for pid=27207 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) close(r1) [ 1127.067724] audit: type=1400 audit(1555924315.481:5457): avc: denied { map } for pid=27207 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1127.192842] audit: type=1400 audit(1555924315.501:5458): avc: denied { map } for pid=27207 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1127.317767] protocol 88fb is buggy, dev hsr_slave_0 [ 1127.323027] protocol 88fb is buggy, dev hsr_slave_1 [ 1127.328359] protocol 88fb is buggy, dev hsr_slave_0 [ 1127.333554] protocol 88fb is buggy, dev hsr_slave_1 09:11:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffff000fffea, 0xffffffff000fffea, 0x349}}, 0x0, 0x10034b}, 0x76) [ 1127.371888] audit: type=1400 audit(1555924315.501:5459): avc: denied { map } for pid=27207 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000003b00)=[{&(0x7f0000003ac0)="975a336890ed720b1ec1207a5e7f93315f", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000006880)=[{{&(0x7f0000000000)=@ipx, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/36, 0xf}, {&(0x7f00000017c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000600)=""/154, 0x9a}}], 0xf, 0x0, 0x0) [ 1127.571270] audit: type=1400 audit(1555924315.581:5460): avc: denied { map } for pid=27207 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:56 executing program 2: syz_execute_func(&(0x7f0000000100)="f3e100def9575cc3b7d991d6734e4e73224a460f30096ccc2e67660e50e94d00c9c966440f38082173294ad0d26c4507c422f18cf0bf420fae9972b571b99f0b467785fb") [ 1127.723002] audit: type=1400 audit(1555924315.631:5461): avc: denied { map } for pid=27207 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1127.895264] audit: type=1400 audit(1555924315.651:5462): avc: denied { map } for pid=27207 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:56 executing program 3: r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, 0x0}, 0x0) listen(r0, 0x0) 09:11:56 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semop(0x0, &(0x7f0000000080)=[{0x0, 0x80}, {}], 0x2) semop(0x0, &(0x7f0000000240)=[{0x0, 0x7f94}], 0x1) 09:11:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) close(r1) [ 1128.039949] audit: type=1400 audit(1555924315.681:5463): avc: denied { map } for pid=27207 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1128.117760] protocol 88fb is buggy, dev hsr_slave_0 [ 1128.122879] protocol 88fb is buggy, dev hsr_slave_1 [ 1128.203457] audit: type=1400 audit(1555924315.701:5464): avc: denied { map } for pid=27207 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:56 executing program 5: semop(0x0, &(0x7f0000000140)=[{0x0, 0x8001}], 0x1) semop(0x0, &(0x7f0000000080)=[{0x0, 0x80, 0x1800}, {0x3, 0xfffffffffffffffc}], 0x2) semop(0x0, &(0x7f0000000240)=[{0x0, 0x7fff, 0x1000}], 0x1) [ 1128.327733] audit: type=1400 audit(1555924315.791:5465): avc: denied { map } for pid=27207 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:11:57 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x800c0910, &(0x7f0000000080)={0x0, 0x0, 0x7a1, 0x0}) 09:11:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) close(r1) 09:11:57 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x11, r0, 0x0) pipe(&(0x7f0000000100)) 09:11:57 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000200)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) close(r0) 09:11:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f00000004c0)='\t', 0x1}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x15}) 09:11:57 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 09:11:58 executing program 5: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x39c, &(0x7f00000000c0)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 09:11:58 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000080)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '?'}, 0x119) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 09:11:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00\x00\x00\x06\x00', &(0x7f00000003c0)=@ethtool_pauseparam}) 09:11:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x10}, 0x14}}, 0x0) 09:11:59 executing program 3: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setresuid(0x0, 0xffffffffffffffff, 0x0) 09:11:59 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200800, 0x0) 09:11:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) 09:11:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x6e, 0x4) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff04, 0x420ffe0, 0x0, 0x37) 09:11:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) shutdown(r1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}], 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x9}, 0x1c) 09:12:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r2, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80b}, 0xc, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$l2tp(0x18, 0x1, 0x1) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000001c0)={0x11, @multicast1, 0x0, 0x0, 'fo\x00', 0x20, 0x90c8}, 0x2c) mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) [ 1131.477788] net_ratelimit: 18 callbacks suppressed [ 1131.477797] protocol 88fb is buggy, dev hsr_slave_0 [ 1131.488258] protocol 88fb is buggy, dev hsr_slave_1 [ 1131.493535] protocol 88fb is buggy, dev hsr_slave_0 [ 1131.498801] protocol 88fb is buggy, dev hsr_slave_1 [ 1132.052829] kauditd_printk_skb: 89 callbacks suppressed [ 1132.052846] audit: type=1400 audit(1555924320.581:5555): avc: denied { create } for pid=28471 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 09:12:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x10}, 0x14}}, 0x0) [ 1132.209340] audit: type=1400 audit(1555924320.701:5556): avc: denied { map } for pid=28521 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1132.277750] protocol 88fb is buggy, dev hsr_slave_0 [ 1132.282972] protocol 88fb is buggy, dev hsr_slave_1 [ 1132.288231] protocol 88fb is buggy, dev hsr_slave_0 [ 1132.293348] protocol 88fb is buggy, dev hsr_slave_1 [ 1132.354468] audit: type=1400 audit(1555924320.711:5557): avc: denied { map } for pid=28521 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000040)={0x7, 0x0, 0x7e}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000000)={0x9, 0x80000001}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1132.501771] audit: type=1400 audit(1555924320.731:5558): avc: denied { map } for pid=28521 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1132.607769] protocol 88fb is buggy, dev hsr_slave_0 [ 1132.612972] protocol 88fb is buggy, dev hsr_slave_1 [ 1132.632952] audit: type=1400 audit(1555924320.741:5559): avc: denied { map } for pid=28521 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fff7f0081004e220000000058000b4824ca945f64009400060028925aa8000000000000008000f0fffeffe809000000fff5dd000000100001000254000041e0032a5347e86d", 0x58}], 0x1) [ 1132.770271] audit: type=1400 audit(1555924320.791:5560): avc: denied { map } for pid=28521 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x6e, 0x4) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff04, 0x420ffe0, 0x0, 0x37) [ 1132.915823] audit: type=1400 audit(1555924320.831:5561): avc: denied { map } for pid=28521 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:01 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x400000012, r0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000600)={0x4, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="01634040"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x4c, 0x0, &(0x7f0000000200)="52e46ec7e2e5ff35ecd01e3a752dc0675d51bccfb9eceb00ab04c5bfe026e1b0a07900b74c0c5801ccab9768d7a389869a080ded06e6b7a07bd8972da4a1d89154ee9e2e5d385372e9be3268"}) [ 1133.125261] audit: type=1400 audit(1555924320.841:5562): avc: denied { map } for pid=28521 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1133.289834] audit: type=1400 audit(1555924320.941:5563): avc: denied { map } for pid=28521 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xe) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) [ 1133.414238] audit: type=1400 audit(1555924320.961:5564): avc: denied { map } for pid=28521 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x10}, 0x14}}, 0x0) 09:12:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6d616e676c650000000000d7d28d2ebe07def15d0000000000000000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d8dd0d93c7d71c54c000000000000000000b00400000000000000000000e8050000e8050000e80500004ebbe033f3c525ccbb1af8499debd3b9c789e348a8f65d236c1cfa0975e3a1a220bcae8f3c9c04c3ddcebe3bebbb7c4fe1771f333f54ee075523599897408f3b48561a6e9b6a35fb8432f3eb6983eb7a6ae527662217f9c54562a886722b3c3e8f80494d66fe498b7cce39afdfd6545993b918da07d9c007af21d33d68b5a2e33926bea2ab"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 09:12:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="71756965742c747970653d14370c692c7569643d", @ANYRESHEX]) 09:12:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x6e, 0x4) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff04, 0x420ffe0, 0x0, 0x37) 09:12:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0xc, 0x4, 0x81000000004, 0x8000000007, 0x0, r1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) 09:12:03 executing program 5: fchdir(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000500)) flistxattr(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) shmget(0x3, 0x3000, 0x0, &(0x7f0000572000/0x3000)=nil) clock_gettime(0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r1, 0x0) request_key(0x0, 0x0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0xfffffffffffffffa) 09:12:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x10}, 0x14}}, 0x0) 09:12:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x6e, 0x4) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff04, 0x420ffe0, 0x0, 0x37) 09:12:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000008000/0x18000)=nil, 0x0, 0x0, 0x4, &(0x7f0000000100), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:12:04 executing program 3: r0 = memfd_create(&(0x7f0000000200)='#vmem1\x00', 0x0) write(r0, &(0x7f0000002000)="0f", 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x82) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000000), 0x0) 09:12:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/116, 0x8001) 09:12:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, 0x0) 09:12:04 executing program 1: semop(0x0, &(0x7f0000000080)=[{0x7}], 0x1) [ 1136.757778] net_ratelimit: 22 callbacks suppressed [ 1136.757787] protocol 88fb is buggy, dev hsr_slave_0 [ 1136.768001] protocol 88fb is buggy, dev hsr_slave_1 09:12:05 executing program 0: bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x7fff, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) [ 1136.997735] protocol 88fb is buggy, dev hsr_slave_0 [ 1137.002997] protocol 88fb is buggy, dev hsr_slave_1 [ 1137.079643] kauditd_printk_skb: 100 callbacks suppressed [ 1137.079658] audit: type=1400 audit(1555924325.611:5665): avc: denied { map } for pid=29765 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:05 executing program 4: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/nfsfs\x00') socket$nl_generic(0x10, 0x3, 0x10) bind$isdn(r1, &(0x7f0000000580)={0x22, 0x3, 0x3, 0x7, 0x1fd}, 0x6) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, &(0x7f0000000780)) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, 0x0, 0x40081) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x394, 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) r3 = dup2(r0, r2) read(r3, &(0x7f00000000c0)=""/85, 0x321) write$P9_RWRITE(r2, &(0x7f0000000000)={0xb}, 0xb) close(0xffffffffffffffff) [ 1137.198033] audit: type=1400 audit(1555924325.671:5666): avc: denied { map } for pid=29765 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) [ 1137.342257] audit: type=1400 audit(1555924325.681:5667): avc: denied { map } for pid=29765 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:05 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="240000000d061f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 1137.541047] audit: type=1400 audit(1555924325.701:5668): avc: denied { map } for pid=29790 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1137.636008] audit: type=1400 audit(1555924325.711:5669): avc: denied { map } for pid=29790 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1137.717751] protocol 88fb is buggy, dev hsr_slave_0 [ 1137.723024] protocol 88fb is buggy, dev hsr_slave_1 [ 1137.728350] protocol 88fb is buggy, dev hsr_slave_0 [ 1137.733532] protocol 88fb is buggy, dev hsr_slave_1 [ 1137.763335] audit: type=1400 audit(1555924325.721:5670): avc: denied { map } for pid=29765 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1138.035193] audit: type=1400 audit(1555924325.731:5671): avc: denied { map } for pid=29790 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:06 executing program 3: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x21000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3f36533f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="839c8636", 0x4}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x4000000000002c5, 0x0, 0x0) [ 1138.212976] audit: type=1400 audit(1555924325.761:5672): avc: denied { map } for pid=29790 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1138.237439] audit: type=1400 audit(1555924325.761:5673): avc: denied { map } for pid=29765 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:06 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x20, 0x2) write$evdev(r0, &(0x7f0000000180)=[{{0x0, 0x2710}, 0x1, 0x400000000000050, 0x400000002}], 0x4de) [ 1138.261908] audit: type=1400 audit(1555924325.821:5674): avc: denied { map } for pid=29790 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1138.517744] protocol 88fb is buggy, dev hsr_slave_0 [ 1138.522875] protocol 88fb is buggy, dev hsr_slave_1 09:12:07 executing program 5: mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x440000000002011, 0xffffffffffffffff, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x541a, 0x3) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x3, 0x111000) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) write$sndseq(r1, &(0x7f00000000c0)=[{0x0, 0x2, 0x0, 0x0, @time={0x77359400}, {0x0, 0x1}, {0x0, 0xfff}, @note={0x0, 0x6}}], 0x30) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x8) close(r1) clone(0x10002102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) syz_open_dev$sndtimer(0x0, 0x0, 0x0) [ 1138.695878] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 1138.731334] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 09:12:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-512-generic,chacha20-generic)\x00'}, 0x58) 09:12:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') writev(r2, &(0x7f0000000080), 0x1a6) 09:12:07 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffff57ffccad000c000100060d00007d5500010c00020000002201f6f00061"], 0x2c}}, 0x0) exit_group(0xb0) 09:12:08 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x20, 0x2) write$evdev(r0, &(0x7f0000000180)=[{{0x0, 0x2710}, 0x1, 0x400000000000050, 0x400000002}], 0x4de) [ 1139.905007] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 09:12:08 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x2}, 0x14) 09:12:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_wolinfo={0x7, 0x0, 0x0, "f184b02f36e9"}}) 09:12:08 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, 0x0}], 0x1, 0x58, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:12:09 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x20, 0x2) write$evdev(r0, &(0x7f0000000180)=[{{0x0, 0x2710}, 0x1, 0x400000000000050, 0x400000002}], 0x4de) 09:12:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = creat(&(0x7f0000000e40)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x84003ff) write$P9_RXATTRCREATE(r1, &(0x7f0000000040)={0x7}, 0x7) lseek(r1, 0x0, 0x3) 09:12:09 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) ioctl$BLKSECTGET(r0, 0x1267, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getegid() sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 09:12:09 executing program 1: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1}) 09:12:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000001bc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x1}], 0xfffffffffffffe8e, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) [ 1141.877729] net_ratelimit: 18 callbacks suppressed [ 1141.877739] protocol 88fb is buggy, dev hsr_slave_0 [ 1141.888093] protocol 88fb is buggy, dev hsr_slave_1 [ 1141.893387] protocol 88fb is buggy, dev hsr_slave_0 [ 1141.898637] protocol 88fb is buggy, dev hsr_slave_1 09:12:10 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000003c80)={0x0, 0x0, 0x2080}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00'}) r4 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r2, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, 0x0, 0x246) sendto$inet(r4, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0) accept4$unix(r4, &(0x7f0000000440), 0x0, 0x800) r5 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000}) mq_timedsend(r5, &(0x7f0000000040), 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/60) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r5, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x20, &(0x7f00000000c0)) 09:12:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000036c0)=[{0x0, 0x0, 0x0}], 0x1, 0x8000) accept$alg(r1, 0x0, 0x0) 09:12:10 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x4000, 0x0, &(0x7f0000670000/0x4000)=nil) 09:12:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x20, 0x2) write$evdev(r0, &(0x7f0000000180)=[{{0x0, 0x2710}, 0x1, 0x400000000000050, 0x400000002}], 0x4de) [ 1142.132278] kauditd_printk_skb: 91 callbacks suppressed [ 1142.132295] audit: type=1800 audit(1555924330.661:5766): pid=30967 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16605 res=0 [ 1142.581239] audit: type=1400 audit(1555924331.111:5767): avc: denied { map } for pid=31158 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1142.677765] audit: type=1400 audit(1555924331.111:5768): avc: denied { map } for pid=31158 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1142.678927] protocol 88fb is buggy, dev hsr_slave_0 [ 1142.705818] protocol 88fb is buggy, dev hsr_slave_1 [ 1142.711371] protocol 88fb is buggy, dev hsr_slave_0 [ 1142.717527] protocol 88fb is buggy, dev hsr_slave_1 [ 1142.832320] audit: type=1400 audit(1555924331.111:5769): avc: denied { map } for pid=31158 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1142.865709] audit: type=1400 audit(1555924331.151:5770): avc: denied { map } for pid=31158 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1142.933950] audit: type=1400 audit(1555924331.201:5771): avc: denied { map } for pid=31158 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1142.997911] protocol 88fb is buggy, dev hsr_slave_0 [ 1143.003062] protocol 88fb is buggy, dev hsr_slave_1 [ 1143.092472] audit: type=1400 audit(1555924331.241:5772): avc: denied { map } for pid=31160 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:11 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) socket$inet6(0xa, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffd47, 0x0, 0x0, 0x0) 09:12:11 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x73) connect(r0, &(0x7f0000000000)=@nl=@unspec, 0x80) [ 1143.262284] audit: type=1400 audit(1555924331.251:5773): avc: denied { map } for pid=31160 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:11 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) lstat(0x0, &(0x7f0000000180)) ioctl$FIGETBSZ(r0, 0x2, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x17, 0x0, &(0x7f0000000080)) getdents64(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='.\x00', &(0x7f00000003c0)='./file0/../file0/file0\x00') 09:12:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e617400000000000080dd00000000004c020fc5529c000032b58fa40e000009000000000000000000000000001b000000550d000018030000cc000000ac010000010000001004c1e090e15bff070000000000000010b2c1"], 0x1) [ 1143.409666] audit: type=1400 audit(1555924331.261:5774): avc: denied { map } for pid=31158 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1143.602472] audit: type=1400 audit(1555924331.261:5775): avc: denied { map } for pid=31158 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:12 executing program 2: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="052f0051065d94f64302fed11be1925e0b96c73c7f000000191cc77ea6dffcd7a2430000000000b960b474322514788ebc6ced95908c89f9ca"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:12:12 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004a80)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001540)=""/232, 0xe8}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") readv(r1, &(0x7f00000002c0), 0x1000000000000385) 09:12:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000080607031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 09:12:13 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x2) 09:12:13 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)) close(r0) recvmsg$kcm(r1, &(0x7f0000000900)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)=""/204, 0xcc}], 0x1, &(0x7f00000008c0)=""/26, 0x1a}, 0x0) 09:12:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x18}]}}}]}, 0x3c}}, 0x0) 09:12:13 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xf) [ 1145.389211] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 09:12:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="01634040"], 0x0, 0x0, 0x0}) socket$inet_smc(0x2b, 0x1, 0x0) 09:12:14 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003400)=[{{0x0, 0x0, &(0x7f0000002cc0)=[{0x0}], 0x1}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001ff, 0x0) [ 1146.116372] netlink: 'syz-executor.3': attribute type 24 has an invalid length. 09:12:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000380)=[@textreal={0x8, &(0x7f0000000000)="0f20e06635000004000f22e0f40ff2bb001066b9530b000066b80a00000066ba000000000f3066b9e00600000f3266b9b209000066b80068000066ba000000000f303e660f38dcc4baf80c66b8803ae88b66efbafc0c66ed0f01d966b8f9a05f790f23d80f21f86635000000200f23f8", 0x70}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000300)=ANY=[]) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1146.219401] (unnamed net_device) (uninitialized): option ad_actor_sys_prio: mode dependency failed, not supported in mode balance-rr(0) 09:12:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0xa7f, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') syz_open_dev$media(0x0, 0x20000000000, 0x400) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0xfffffffffffffffd) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x401, 0x52, 0x0, 0x7}) r3 = socket(0x1e, 0x4, 0x0) r4 = syz_open_dev$dri(&(0x7f00000003c0)='/dev/dri/card#\x00', 0x60, 0x200000) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(0x0, 0x0, 0x88082) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000040), 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xf6) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x20a00, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x2, &(0x7f0000ff9000/0x4000)=nil, 0x9}) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 09:12:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2, 0xffffffd5, 0x0, 0x1b0001}, [@ldst={0xffffffbd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) [ 1146.430080] binder: 32435:32437 transaction failed 29189/-22, size 0-0 line 2855 [ 1146.495165] binder: undelivered TRANSACTION_ERROR: 29189 09:12:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xf24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x5, 0xfffffffffffffff7, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x6ea, 0x5e6, 0x3ff, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0xa56, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xe703000000000000]}, 0x2c) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xe) ioctl$TCSETS(r1, 0x5423, &(0x7f0000000140)) [ 1147.147862] kauditd_printk_skb: 98 callbacks suppressed [ 1147.147877] audit: type=1400 audit(1555924335.671:5874): avc: denied { map } for pid=32611 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1147.175962] net_ratelimit: 22 callbacks suppressed [ 1147.175971] protocol 88fb is buggy, dev hsr_slave_0 [ 1147.186065] protocol 88fb is buggy, dev hsr_slave_1 09:12:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'bond_slave_0\x00'}, 0x18) 09:12:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000010000000000003000000003030000ff3f567b0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) [ 1147.302939] audit: type=1400 audit(1555924335.731:5875): avc: denied { map } for pid=32611 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1147.397914] protocol 88fb is buggy, dev hsr_slave_0 [ 1147.403170] protocol 88fb is buggy, dev hsr_slave_1 [ 1147.455741] audit: type=1400 audit(1555924335.741:5876): avc: denied { map } for pid=32611 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f0000000300)='./file0\x00', 0x400002200006009, 0x1) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$BLKALIGNOFF(r1, 0x127b, &(0x7f0000000000)) [ 1147.606956] audit: type=1400 audit(1555924335.791:5877): avc: denied { map } for pid=32611 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1147.784645] audit: type=1400 audit(1555924335.801:5878): avc: denied { create } for pid=32626 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:12:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) 09:12:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00', 0x10) sendto(r0, &(0x7f00000001c0)="96", 0x1, 0x0, 0x0, 0x0) [ 1147.971614] audit: type=1400 audit(1555924335.801:5879): avc: denied { map } for pid=32611 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1148.117738] protocol 88fb is buggy, dev hsr_slave_0 [ 1148.122985] protocol 88fb is buggy, dev hsr_slave_1 [ 1148.128340] protocol 88fb is buggy, dev hsr_slave_0 [ 1148.133544] protocol 88fb is buggy, dev hsr_slave_1 [ 1148.163078] audit: type=1400 audit(1555924335.801:5880): avc: denied { write } for pid=32626 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1148.308347] audit: type=1400 audit(1555924335.871:5881): avc: denied { read } for pid=32626 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1148.567299] audit: type=1400 audit(1555924335.891:5882): avc: denied { map } for pid=32611 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1148.705058] audit: type=1400 audit(1555924335.911:5883): avc: denied { map } for pid=32611 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1148.917731] protocol 88fb is buggy, dev hsr_slave_0 [ 1148.922953] protocol 88fb is buggy, dev hsr_slave_1 09:12:17 executing program 3: r0 = fanotify_init(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r2 = dup(r0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000080)={0x28}, 0xfe29) 09:12:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 09:12:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000035483b34000001"], 0x10}}, 0x0) 09:12:17 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="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", 0xfc) 09:12:18 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$X25_QBITINCL(r0, 0x106, 0x4, 0x0, 0xcd) 09:12:18 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x2) [ 1150.243524] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. 09:12:18 executing program 1: clock_nanosleep(0x40000000, 0x0, 0x0, 0x0) 09:12:19 executing program 3: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x2, r2}) 09:12:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 09:12:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000035483b34000001"], 0x10}}, 0x0) 09:12:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102], 0x1f000}) setxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00fb6f0000bd517734de889e180862a0e28e1c95139b09895d60e5dd9ea752e721bb8ad797d1171b293ef461411ec6a28d3c6fede13267b94e4d2dd292f6ad902ff6616b5b54c91009feffff000000000000ba9bca12d3dff0552f0fd4135f229b7f147c723ecef622abaf1752a33f9ac1025a046b46b3dad40e1f9a0000003549d746a8d7026b6b8c09484b90c573733ab443a0aafeee5b9b9e0591dcdf18a4c1a16b1ab7d0368103ba0f1b81883cabb53b48a44c8a683364aedd269b39df4e79e0f677"], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:12:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$9p(0xffffffffffffffff, 0x0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:ld_so_cache_t:s0\x00', 0x23, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x20) stat(&(0x7f0000000140)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000180)=@v3, 0x18, 0x1) wait4(0x0, 0x0, 0x0, 0x0) 09:12:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 09:12:20 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x2) 09:12:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1152.198979] kauditd_printk_skb: 95 callbacks suppressed [ 1152.198994] audit: type=1400 audit(1555924340.731:5979): avc: denied { map } for pid=1795 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1152.278123] net_ratelimit: 18 callbacks suppressed [ 1152.278132] protocol 88fb is buggy, dev hsr_slave_0 [ 1152.288494] protocol 88fb is buggy, dev hsr_slave_1 [ 1152.293771] protocol 88fb is buggy, dev hsr_slave_0 [ 1152.299050] protocol 88fb is buggy, dev hsr_slave_1 [ 1152.382141] audit: type=1400 audit(1555924340.781:5980): avc: denied { map } for pid=1795 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000035483b34000001"], 0x10}}, 0x0) [ 1152.562760] audit: type=1400 audit(1555924340.791:5981): avc: denied { map } for pid=1795 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1152.741962] audit: type=1400 audit(1555924340.891:5982): avc: denied { map } for pid=1795 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fanotify_init(0x1c, 0x0) 09:12:21 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [0x29c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff89, 0x0, 0x0, 0x0, [0x14, 0x0, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3201]}}}}}}}}, 0x0) [ 1152.939690] audit: type=1400 audit(1555924340.891:5983): avc: denied { map } for pid=1795 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1153.077767] protocol 88fb is buggy, dev hsr_slave_0 [ 1153.082912] protocol 88fb is buggy, dev hsr_slave_1 [ 1153.082961] audit: type=1400 audit(1555924341.031:5984): avc: denied { map } for pid=1795 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1153.088157] protocol 88fb is buggy, dev hsr_slave_0 [ 1153.117486] protocol 88fb is buggy, dev hsr_slave_1 [ 1153.246198] audit: type=1400 audit(1555924341.081:5985): avc: denied { map } for pid=1795 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1153.397780] protocol 88fb is buggy, dev hsr_slave_0 [ 1153.402909] protocol 88fb is buggy, dev hsr_slave_1 [ 1153.423919] audit: type=1400 audit(1555924341.431:5986): avc: denied { map } for pid=2169 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:22 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x2) [ 1153.589136] audit: type=1400 audit(1555924341.441:5987): avc: denied { map } for pid=2169 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1153.752366] audit: type=1400 audit(1555924341.441:5988): avc: denied { map } for pid=2169 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4}}, 0x26) 09:12:22 executing program 1: setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) getpgid(0x0) io_setup(0xfffffffffffffff7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4004700e, 0x4) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x5}) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_INPUT(0xffffffffffffffff, 0x80045626, &(0x7f0000000380)) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, 0x0, &(0x7f00000002c0)) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000001c0)={0x6, 0x7, 0x7, 0x2, 0x3, 0x9, 0x3, 0x8, 0x0, 0x0, 0x7fff, 0x80000001, 0xffffffff, 0x4, &(0x7f0000000140)=""/97, 0x0, 0x2000000, 0x1}) r2 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x1, 0x0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000240)={0x29, 0x6, 0x0, {0x4, 0x3}}, 0x29) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x5, @ipv4={[], [], @rand_addr=0x1a}}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @loopback, 0x40}, @in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}], 0x64) ioctl$int_in(r2, 0x80006080044d76, &(0x7f00000000c0)) 09:12:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000035483b34000001"], 0x10}}, 0x0) 09:12:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x1c, r1, 0xfc698b8692517f15, 0x0, 0x0, {0x7}, [@TIPC_NLA_NODE={0x5, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x0) 09:12:23 executing program 4: pipe2$9p(0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r0, 0x8003f1) r1 = open(&(0x7f0000000200)='./bus\x00', 0x121401, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000280)=0x401) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xffffffff}) 09:12:23 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x2) 09:12:23 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4}}, 0x26) 09:12:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000300)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 09:12:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="73656375726974790900000000000000000000000000010000000000000004000e0000230400000048030000f9426a0ca2b7f327e42800002801"], 0x1) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r1, 0x3b) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="053fd7a35c7e566fc75de43a03c841ca318179c85f0edd9510266e4adcde3600008f0bfb9331ab4f2919000000f4ab8da466edb872a3b0b308"], 0x39) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r2, 0x0, 0x0) 09:12:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 09:12:24 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) listen(r0, 0x0) 09:12:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000007dc0)='GPL\x00'}, 0x48) [ 1156.366296] overlayfs: './file0' not a directory 09:12:25 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4}}, 0x26) 09:12:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1, 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0), 0xfffffff9}], 0x1) 09:12:25 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SIOCGSTAMP(r0, 0x89e2, 0x0) 09:12:25 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000540)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000180)={0x0, 0x1, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) [ 1157.212685] kauditd_printk_skb: 89 callbacks suppressed [ 1157.212699] audit: type=1400 audit(1555924345.741:6078): avc: denied { map } for pid=3437 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1157.364323] audit: type=1400 audit(1555924345.781:6079): avc: denied { map } for pid=3437 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4}}, 0x26) [ 1157.557757] net_ratelimit: 22 callbacks suppressed [ 1157.557767] protocol 88fb is buggy, dev hsr_slave_0 [ 1157.567920] protocol 88fb is buggy, dev hsr_slave_1 09:12:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_netdev_private(r0, 0x89f2, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") rt_sigaction(0x11, &(0x7f0000000180)={0x0, {}, 0x0, 0x0}, &(0x7f0000000080)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000040)) 09:12:26 executing program 3: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40002, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0xc028660f, &(0x7f0000000780)) [ 1157.782661] audit: type=1400 audit(1555924346.311:6080): avc: denied { map } for pid=3734 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1157.805269] protocol 88fb is buggy, dev hsr_slave_0 [ 1157.805328] protocol 88fb is buggy, dev hsr_slave_1 [ 1157.938202] audit: type=1400 audit(1555924346.351:6081): avc: denied { map } for pid=3734 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1158.064139] audit: type=1400 audit(1555924346.401:6082): avc: denied { map } for pid=3734 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1158.217856] audit: type=1400 audit(1555924346.411:6083): avc: denied { map } for pid=3734 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 09:12:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000f919000000000002800000850000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f00000003c0)="aba13a24affa65cb9a5b49a77182", 0x0, 0xffff}, 0x28) [ 1158.410735] audit: type=1400 audit(1555924346.471:6084): avc: denied { map } for pid=3734 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1158.517756] protocol 88fb is buggy, dev hsr_slave_0 [ 1158.522992] protocol 88fb is buggy, dev hsr_slave_1 [ 1158.528366] protocol 88fb is buggy, dev hsr_slave_0 [ 1158.533567] protocol 88fb is buggy, dev hsr_slave_1 [ 1158.577131] audit: type=1400 audit(1555924346.501:6085): avc: denied { map } for pid=3734 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1158.777943] audit: type=1400 audit(1555924346.511:6086): avc: denied { map } for pid=3734 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_acct\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0xe6) [ 1158.947464] audit: type=1400 audit(1555924346.571:6087): avc: denied { map } for pid=3734 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1159.317738] protocol 88fb is buggy, dev hsr_slave_0 [ 1159.323060] protocol 88fb is buggy, dev hsr_slave_1 09:12:27 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0x3d87}], 0x146) 09:12:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r5, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) clock_gettime(0x1, &(0x7f00000000c0)) setsockopt$inet6_buf(r5, 0x29, 0xef, &(0x7f0000000600)="0294899499e5f22f9c5f8e3875af05ea53e0480cf080f7f128910d005d3c72cf4a3dca790600f7271a0778bdf835503a7d1511ba9461659b23e7d4f6a31b9642065dad2759c82866541df7d3e8b19aa82049f6a03325ecdf6220eac5c3b80f3c6c5b8ddbc3b4d43195d3fea189399f81a0753bce32e903767c22fd37b4750a4b7cf613995a949e22a9c305cae307ac64b100368aa665593bda4321b954ed75b35dea95b23abc23f33116b40cf16460dc3cea1ed979af8b3ce377c2e52e0b7ac4f9561602a04c94587ad1215eacd78e2996397b38435cca917318a6d3b26897e239037c6e2718e71e", 0xe8) sendmmsg(r3, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1159.871578] selinux_nlmsg_perm: 102 callbacks suppressed [ 1159.871599] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4271 comm=syz-executor.0 09:12:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r3 = dup3(r0, r1, 0x80000) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000200)={0x2, 0x1, 0x9, 0x7f, 0x1000, 0x212b}) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000080)={0x7fff, {{0x2, 0x4e21, @local}}, 0x0, 0x1, [{{0x2, 0x4e22, @empty}}]}, 0x110) 09:12:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x4, 0x80002, 0x8000) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$PPPIOCDISCONN(r1, 0x7439) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x100, 0x20000) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f00000000c0)=""/57) sendmmsg(r2, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1160.275377] sg_read: process 5388 (syz-executor.4) changed security contexts after opening file descriptor, this is not allowed. 09:12:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r5, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) clock_gettime(0x1, &(0x7f00000000c0)) setsockopt$inet6_buf(r5, 0x29, 0xef, &(0x7f0000000600)="0294899499e5f22f9c5f8e3875af05ea53e0480cf080f7f128910d005d3c72cf4a3dca790600f7271a0778bdf835503a7d1511ba9461659b23e7d4f6a31b9642065dad2759c82866541df7d3e8b19aa82049f6a03325ecdf6220eac5c3b80f3c6c5b8ddbc3b4d43195d3fea189399f81a0753bce32e903767c22fd37b4750a4b7cf613995a949e22a9c305cae307ac64b100368aa665593bda4321b954ed75b35dea95b23abc23f33116b40cf16460dc3cea1ed979af8b3ce377c2e52e0b7ac4f9561602a04c94587ad1215eacd78e2996397b38435cca917318a6d3b26897e239037c6e2718e71e", 0xe8) sendmmsg(r3, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 09:12:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2c, &(0x7f00000002c0)={0x100, {{0xa, 0x4e22, 0x7fff, @mcast2, 0x8}}, {{0xa, 0x4e23, 0x3a80000, @mcast1, 0x20}}}, 0x108) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000000100)="1d9c4ccfb8d9552ad78d968f11011340cd310ebc26192a5bdbb230dd15bda8cbd2916e7578f106adbf4cd972bebd8d7da7cefb00f4015cb75a7889a1f699c72444ceedec82c677cd9c88e7e60a0c7b8a5382ffe4a5d72f3fa77f0dff0008000000b196ffe81d38c42a0841c36e1b86ea2f89b2b5a342428f29f10b1b6d91a67979e6753adbf9f1", 0x87) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x8082, 0x0) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0xffffffffffffd35, &(0x7f0000001fc0)}, 0x20000000}], 0x400000000000047, 0x0) 09:12:29 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x80000, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0xe) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti6'}, {0xd900}}}]}, 0x30}}, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) 09:12:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r3 = dup3(r0, r1, 0x80000) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000200)={0x2, 0x1, 0x9, 0x7f, 0x1000, 0x212b}) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000080)={0x7fff, {{0x2, 0x4e21, @local}}, 0x0, 0x1, [{{0x2, 0x4e22, @empty}}]}, 0x110) 09:12:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x4, 0x80002, 0x8000) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$PPPIOCDISCONN(r1, 0x7439) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x100, 0x20000) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f00000000c0)=""/57) sendmmsg(r2, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1161.488892] Unknown ioctl 19299 09:12:30 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}, 0x14, 0x8000000000000038}], 0x18) syz_open_dev$usbmon(&(0x7f0000001180)='/dev/usbmon#\x00', 0x9a, 0x18000) r1 = ioctl$TIOCGPTPEER(0xffffffffffffff9c, 0x5441, 0x226) r2 = syz_open_dev$vcsa(&(0x7f0000001200)='/dev/vcsa#\x00', 0x4, 0x100) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000011c0)=0x14) recvfrom(r2, &(0x7f00000012c0)=""/114, 0x72, 0x2, &(0x7f0000001340)=@hci={0x1f, r3, 0x2}, 0x80) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001240)=0x0) ptrace$setregs(0xf, r4, 0x2400000000000000, &(0x7f0000000080)="9da026d207edacaed2ad9234283ac07c8e25ce9f5656e4d7dff547bb93c6023414932e1fbefa8cae6c177a1dcfa1680f80824a8a5bdead") r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x20000, 0x0) sendto$x25(r5, &(0x7f0000000140)="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", 0x1000, 0x8000, &(0x7f0000001140)={0x9, @remote={[], 0x2}}, 0x12) 09:12:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r5, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) clock_gettime(0x1, &(0x7f00000000c0)) setsockopt$inet6_buf(r5, 0x29, 0xef, &(0x7f0000000600)="0294899499e5f22f9c5f8e3875af05ea53e0480cf080f7f128910d005d3c72cf4a3dca790600f7271a0778bdf835503a7d1511ba9461659b23e7d4f6a31b9642065dad2759c82866541df7d3e8b19aa82049f6a03325ecdf6220eac5c3b80f3c6c5b8ddbc3b4d43195d3fea189399f81a0753bce32e903767c22fd37b4750a4b7cf613995a949e22a9c305cae307ac64b100368aa665593bda4321b954ed75b35dea95b23abc23f33116b40cf16460dc3cea1ed979af8b3ce377c2e52e0b7ac4f9561602a04c94587ad1215eacd78e2996397b38435cca917318a6d3b26897e239037c6e2718e71e", 0xe8) sendmmsg(r3, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1161.817416] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1162.268057] kauditd_printk_skb: 107 callbacks suppressed [ 1162.268073] audit: type=1400 audit(1555924350.801:6195): avc: denied { map } for pid=4885 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r3 = dup3(r0, r1, 0x80000) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000200)={0x2, 0x1, 0x9, 0x7f, 0x1000, 0x212b}) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000080)={0x7fff, {{0x2, 0x4e21, @local}}, 0x0, 0x1, [{{0x2, 0x4e22, @empty}}]}, 0x110) [ 1162.386310] audit: type=1400 audit(1555924350.811:6196): avc: denied { map } for pid=4769 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.504838] audit: type=1400 audit(1555924350.831:6198): avc: denied { map } for pid=4885 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:31 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040)=0x8, 0x4) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x9, 0x4) r1 = socket(0x22, 0x2, 0x4) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0xffffffffffffffff, 0x100000236) signalfd(r1, &(0x7f0000000080)={0x6}, 0x8) [ 1162.626092] audit: type=1400 audit(1555924350.831:6197): avc: denied { map } for pid=4769 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.677745] net_ratelimit: 18 callbacks suppressed [ 1162.677754] protocol 88fb is buggy, dev hsr_slave_0 [ 1162.688042] protocol 88fb is buggy, dev hsr_slave_1 [ 1162.693342] protocol 88fb is buggy, dev hsr_slave_0 [ 1162.698587] protocol 88fb is buggy, dev hsr_slave_1 09:12:31 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101100, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x8, 0x1, 0x5, 0x1, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e24, 0xc1e, @mcast2, 0x9}}, 0x580671ba, 0x800}, &(0x7f00000001c0)=0x90) r2 = socket$pppoe(0x18, 0x1, 0x0) fdatasync(r2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) readahead(r3, 0x5, 0x7f) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, 0x0, 0x0) [ 1162.768644] audit: type=1400 audit(1555924350.831:6199): avc: denied { map } for pid=4885 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1162.969997] audit: type=1400 audit(1555924350.831:6200): avc: denied { map } for pid=4885 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1163.094696] audit: type=1400 audit(1555924350.901:6201): avc: denied { map } for pid=4885 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x4, 0x80002, 0x8000) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$PPPIOCDISCONN(r1, 0x7439) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x100, 0x20000) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f00000000c0)=""/57) sendmmsg(r2, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1163.215804] audit: type=1400 audit(1555924350.981:6202): avc: denied { map } for pid=4885 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1163.312681] audit: type=1400 audit(1555924350.981:6203): avc: denied { map } for pid=4885 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r5, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) clock_gettime(0x1, &(0x7f00000000c0)) setsockopt$inet6_buf(r5, 0x29, 0xef, &(0x7f0000000600)="0294899499e5f22f9c5f8e3875af05ea53e0480cf080f7f128910d005d3c72cf4a3dca790600f7271a0778bdf835503a7d1511ba9461659b23e7d4f6a31b9642065dad2759c82866541df7d3e8b19aa82049f6a03325ecdf6220eac5c3b80f3c6c5b8ddbc3b4d43195d3fea189399f81a0753bce32e903767c22fd37b4750a4b7cf613995a949e22a9c305cae307ac64b100368aa665593bda4321b954ed75b35dea95b23abc23f33116b40cf16460dc3cea1ed979af8b3ce377c2e52e0b7ac4f9561602a04c94587ad1215eacd78e2996397b38435cca917318a6d3b26897e239037c6e2718e71e", 0xe8) sendmmsg(r3, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) [ 1163.417762] audit: type=1400 audit(1555924351.021:6204): avc: denied { map } for pid=4885 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1163.477760] protocol 88fb is buggy, dev hsr_slave_0 [ 1163.482899] protocol 88fb is buggy, dev hsr_slave_1 [ 1163.488132] protocol 88fb is buggy, dev hsr_slave_0 [ 1163.493269] protocol 88fb is buggy, dev hsr_slave_1 09:12:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x6) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000200)) socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x200008c4) r1 = socket$kcm(0x29, 0x5, 0x0) close(r1) r2 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400010003, 0x0) close(r1) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = msgget$private(0x0, 0x8) r5 = geteuid() getgroups(0x4, &(0x7f00000000c0)=[0xee00, 0xee00, 0x0, 0xee00]) fstat(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000440)={{0x80000001, r5, r6, r7, r8, 0x12, 0x4}, 0x8b1, 0x1, 0x1, 0xfffffffffffffff8, 0x7, 0x1, r9, r10}) close(r3) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000300), 0x0) r11 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xc00, 0x0) ioctl$CAPI_CLR_FLAGS(r11, 0x80044325, &(0x7f0000000040)=0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r3, 0x0, 0xffffffffffffffff, 0x8) 09:12:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x101000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x8, &(0x7f00000000c0)=[{}, {}, {0x0}, {}, {}, {}, {}, {}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000240)={r1, &(0x7f0000000140)=""/6}) [ 1163.797769] protocol 88fb is buggy, dev hsr_slave_0 [ 1163.802937] protocol 88fb is buggy, dev hsr_slave_1 09:12:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r3 = dup3(r0, r1, 0x80000) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000200)={0x2, 0x1, 0x9, 0x7f, 0x1000, 0x212b}) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 09:12:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r5, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) clock_gettime(0x1, &(0x7f00000000c0)) setsockopt$inet6_buf(r5, 0x29, 0xef, &(0x7f0000000600)="0294899499e5f22f9c5f8e3875af05ea53e0480cf080f7f128910d005d3c72cf4a3dca790600f7271a0778bdf835503a7d1511ba9461659b23e7d4f6a31b9642065dad2759c82866541df7d3e8b19aa82049f6a03325ecdf6220eac5c3b80f3c6c5b8ddbc3b4d43195d3fea189399f81a0753bce32e903767c22fd37b4750a4b7cf613995a949e22a9c305cae307ac64b100368aa665593bda4321b954ed75b35dea95b23abc23f33116b40cf16460dc3cea1ed979af8b3ce377c2e52e0b7ac4f9561602a04c94587ad1215eacd78e2996397b38435cca917318a6d3b26897e239037c6e2718e71e", 0xe8) 09:12:33 executing program 2: r0 = epoll_create1(0x0) flock(r0, 0x1) r1 = epoll_create1(0x0) flock(r1, 0x2) r2 = gettid() dup2(r0, r1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000015) 09:12:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x4, 0x80002, 0x8000) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$PPPIOCDISCONN(r1, 0x7439) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x100, 0x20000) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f00000000c0)=""/57) 09:12:33 executing program 4: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x61c0) r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f00000000c0)=0x4) connect$unix(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 09:12:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123d319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000016ff0)={&(0x7f0000000780)={0x18, 0x55, 0x3ef, 0x0, 0x0, {0x7}, [@generic="fa"]}, 0x18}}, 0x0) 09:12:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r5, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) clock_gettime(0x1, &(0x7f00000000c0)) 09:12:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='gid_map\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/157, 0x9d}], 0x1, 0x21) 09:12:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r3 = dup3(r0, r1, 0x80000) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000200)={0x2, 0x1, 0x9, 0x7f, 0x1000, 0x212b}) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) [ 1166.339563] PF_BRIDGE: br_mdb_parse() with unknown ifindex 09:12:35 executing program 4: socket$pptp(0x18, 0x1, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x6) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x6) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000000)={0xffffffffffffff1b, 0x12, 0x100000000004000, {0x8, 0x1000000000000, 0xc0}}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) 09:12:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x4, 0x80002, 0x8000) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$PPPIOCDISCONN(r1, 0x7439) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x100, 0x20000) 09:12:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r5, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) clock_gettime(0x1, &(0x7f00000000c0)) 09:12:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0xfffffd27, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x35, 0x835, 0x0, 0x0, {0x2801, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xffffffff00000000}}]}]}, 0x2c}}, 0x0) [ 1167.352592] kauditd_printk_skb: 106 callbacks suppressed [ 1167.352608] audit: type=1400 audit(1555924355.881:6311): avc: denied { map } for pid=6461 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000ed0307041dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000005304ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 1167.512546] audit: type=1400 audit(1555924355.941:6312): avc: denied { map } for pid=6461 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r3 = dup3(r0, r1, 0x80000) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000200)={0x2, 0x1, 0x9, 0x7f, 0x1000, 0x212b}) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) [ 1167.634838] audit: type=1400 audit(1555924355.981:6313): avc: denied { map } for pid=6461 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1167.774246] audit: type=1400 audit(1555924355.981:6314): avc: denied { map } for pid=6461 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1167.828428] net_ratelimit: 22 callbacks suppressed [ 1167.828438] netlink: set zone limit has 4 unknown bytes [ 1167.928006] audit: type=1400 audit(1555924356.071:6315): avc: denied { map } for pid=6461 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1167.967802] protocol 88fb is buggy, dev hsr_slave_0 [ 1167.973003] protocol 88fb is buggy, dev hsr_slave_1 09:12:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r5, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) [ 1168.084815] audit: type=1400 audit(1555924356.121:6316): avc: denied { map } for pid=6461 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1168.197753] protocol 88fb is buggy, dev hsr_slave_0 [ 1168.202984] protocol 88fb is buggy, dev hsr_slave_1 [ 1168.234390] audit: type=1400 audit(1555924356.131:6317): avc: denied { map } for pid=6461 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1168.364894] audit: type=1400 audit(1555924356.191:6318): avc: denied { map } for pid=6461 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1168.504593] audit: type=1400 audit(1555924356.201:6319): avc: denied { map } for pid=6461 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x4, 0x80002, 0x8000) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$PPPIOCDISCONN(r1, 0x7439) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 09:12:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x100000000a, &(0x7f0000000480)=0x9, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) sendto$inet6(r2, &(0x7f0000000080)="d766", 0x2, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x0) 09:12:37 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000140)={0x0, 0x2710}, 0x10) recvmmsg(r0, &(0x7f0000004b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1168.623177] audit: type=1400 audit(1555924356.221:6320): avc: denied { map } for pid=6519 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r3 = dup3(r0, r1, 0x80000) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000200)={0x2, 0x1, 0x9, 0x7f, 0x1000, 0x212b}) [ 1168.917731] protocol 88fb is buggy, dev hsr_slave_0 [ 1168.922960] protocol 88fb is buggy, dev hsr_slave_1 [ 1168.928286] protocol 88fb is buggy, dev hsr_slave_0 [ 1168.933483] protocol 88fb is buggy, dev hsr_slave_1 09:12:37 executing program 0: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000540)) 09:12:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r5, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) [ 1169.717732] protocol 88fb is buggy, dev hsr_slave_0 09:12:38 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) poll(&(0x7f00000001c0)=[{r0, 0x100}], 0x1, 0x0) 09:12:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) dup3(r0, r1, 0x80000) 09:12:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x4, 0x80002, 0x8000) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$PPPIOCDISCONN(r1, 0x7439) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) 09:12:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r0}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, r1) 09:12:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r5, 0x107, 0x5, &(0x7f0000001000), 0xc5) 09:12:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @remote, 0xb}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='bond_slave_0\x00', 0x10) syz_emit_ethernet(0x140, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x4e23, 0x4e20, 0x8}}}}}}, 0x0) 09:12:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) socket(0x11, 0x80002, 0x0) dup3(r0, r1, 0x80000) 09:12:39 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f00000001c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@caif=@rfm={0x25, 0x4, "cd63ac6de8bd3c404654eaf9280cc6d3"}, 0x80, 0x0}}], 0x1, 0x0) 09:12:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x4, 0x80002, 0x8000) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$PPPIOCDISCONN(r1, 0x7439) 09:12:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 09:12:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) dup3(r0, r1, 0x80000) 09:12:40 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r0}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, r1) 09:12:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4000) ftruncate(r1, 0x8200) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000140)={0x18}, 0x18) sendfile(r1, r3, 0x0, 0x8000ffffffff) pread64(r3, &(0x7f0000000480)=""/207, 0xffffff34, 0x0) [ 1172.373475] kauditd_printk_skb: 97 callbacks suppressed [ 1172.373490] audit: type=1400 audit(1555924360.901:6418): avc: denied { map } for pid=7864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:41 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f00000001c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@caif=@rfm={0x25, 0x4, "cd63ac6de8bd3c404654eaf9280cc6d3"}, 0x80, 0x0}}], 0x1, 0x0) [ 1172.541159] audit: type=1400 audit(1555924360.911:6419): avc: denied { map } for pid=7864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.691047] audit: type=1400 audit(1555924360.931:6420): avc: denied { map } for pid=7864 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) dup3(r0, r1, 0x80000) [ 1172.857479] audit: type=1400 audit(1555924360.951:6421): avc: denied { map } for pid=7864 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1173.014284] audit: type=1400 audit(1555924360.961:6422): avc: denied { map } for pid=7870 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1173.077724] net_ratelimit: 19 callbacks suppressed [ 1173.077734] protocol 88fb is buggy, dev hsr_slave_0 [ 1173.088054] protocol 88fb is buggy, dev hsr_slave_1 [ 1173.093330] protocol 88fb is buggy, dev hsr_slave_0 [ 1173.098585] protocol 88fb is buggy, dev hsr_slave_1 [ 1173.173598] audit: type=1400 audit(1555924360.971:6423): avc: denied { map } for pid=7870 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:41 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r0}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, r1) [ 1173.322419] audit: type=1400 audit(1555924361.001:6424): avc: denied { map } for pid=7870 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) r5 = socket(0x11, 0x80002, 0x0) bind$packet(r5, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 09:12:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x4, 0x80002, 0x8000) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) [ 1173.474602] audit: type=1400 audit(1555924361.011:6425): avc: denied { map } for pid=7870 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1173.618445] audit: type=1400 audit(1555924361.011:6426): avc: denied { map } for pid=7864 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1173.708329] audit: type=1400 audit(1555924361.081:6427): avc: denied { map } for pid=7864 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:42 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f00000001c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@caif=@rfm={0x25, 0x4, "cd63ac6de8bd3c404654eaf9280cc6d3"}, 0x80, 0x0}}], 0x1, 0x0) 09:12:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) dup3(r0, r1, 0x80000) [ 1173.877747] protocol 88fb is buggy, dev hsr_slave_0 [ 1173.882900] protocol 88fb is buggy, dev hsr_slave_1 [ 1173.888147] protocol 88fb is buggy, dev hsr_slave_0 [ 1173.893283] protocol 88fb is buggy, dev hsr_slave_1 09:12:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x4038ae7a, 0x0) 09:12:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r0}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, r1) [ 1174.197743] protocol 88fb is buggy, dev hsr_slave_0 [ 1174.202893] protocol 88fb is buggy, dev hsr_slave_1 09:12:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) socket(0x11, 0x80002, 0x0) 09:12:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:12:43 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f00000001c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@caif=@rfm={0x25, 0x4, "cd63ac6de8bd3c404654eaf9280cc6d3"}, 0x80, 0x0}}], 0x1, 0x0) 09:12:43 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000080)={0x0, 0x3}) 09:12:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) 09:12:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) socket(0x4, 0x80002, 0x8000) 09:12:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") dup3(r0, 0xffffffffffffffff, 0x80000) 09:12:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bc070") r1 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) close(r1) 09:12:44 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000140)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}], [], 0x32b6062c}) 09:12:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") dup3(r0, 0xffffffffffffffff, 0x80000) 09:12:45 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000080)={0x0, 0x3}) 09:12:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) 09:12:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={r4, 0x4, 0x100, 0x400}, 0x10) 09:12:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x10, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000180)={0x80102, 0x1}) 09:12:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") dup3(r0, 0xffffffffffffffff, 0x80000) [ 1177.526571] kauditd_printk_skb: 105 callbacks suppressed [ 1177.526587] audit: type=1400 audit(1555924366.051:6533): avc: denied { map } for pid=8862 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@usrjquota_file='usrjquota\"syz'}]}) 09:12:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x5, @local, 0x6751}}, 0x3, 0x10000, 0x101, 0xfffffffffffffffe, 0x8000}, &(0x7f0000000400)=0x98) [ 1177.671524] audit: type=1400 audit(1555924366.091:6534): avc: denied { map } for pid=8862 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:46 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000080)={0x0, 0x3}) [ 1177.815149] audit: type=1400 audit(1555924366.101:6535): avc: denied { map } for pid=8862 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1177.950491] audit: type=1400 audit(1555924366.111:6536): avc: denied { map } for pid=8862 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1178.109721] audit: type=1400 audit(1555924366.171:6537): avc: denied { map } for pid=8862 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1178.289545] audit: type=1400 audit(1555924366.231:6538): avc: denied { map } for pid=8885 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1178.357779] net_ratelimit: 22 callbacks suppressed [ 1178.357787] protocol 88fb is buggy, dev hsr_slave_0 [ 1178.367961] protocol 88fb is buggy, dev hsr_slave_1 09:12:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) [ 1178.438769] audit: type=1400 audit(1555924366.231:6539): avc: denied { map } for pid=8885 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) [ 1178.597759] protocol 88fb is buggy, dev hsr_slave_0 [ 1178.598135] audit: type=1400 audit(1555924366.251:6541): avc: denied { map } for pid=8862 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1178.603089] protocol 88fb is buggy, dev hsr_slave_1 09:12:47 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000080)={0x0, 0x3}) [ 1178.812995] audit: type=1400 audit(1555924366.251:6540): avc: denied { map } for pid=8886 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xd4\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xbc\xbfX\x97\xd0\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r') ftruncate(r0, 0x0) 09:12:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0xfff}}, [0x65d, 0x2, 0x1, 0x2, 0x7, 0x5, 0x1, 0x4, 0x200, 0x5, 0x0, 0x7, 0x4, 0x7f, 0xfffffffffffffe01]}, &(0x7f0000000300)=0x100) [ 1178.947798] audit: type=1400 audit(1555924366.251:6542): avc: denied { map } for pid=8862 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) [ 1179.317739] protocol 88fb is buggy, dev hsr_slave_0 [ 1179.323010] protocol 88fb is buggy, dev hsr_slave_1 [ 1179.328366] protocol 88fb is buggy, dev hsr_slave_0 [ 1179.333565] protocol 88fb is buggy, dev hsr_slave_1 09:12:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x261, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) 09:12:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") unshare(0x400) fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) 09:12:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) 09:12:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) ptrace$setregset(0x4205, r1, 0x2, &(0x7f0000000140)={0x0, 0x34}) 09:12:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) [ 1180.117763] protocol 88fb is buggy, dev hsr_slave_0 [ 1180.123082] protocol 88fb is buggy, dev hsr_slave_1 09:12:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:12:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) 09:12:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) dup2(r0, r1) 09:12:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x261, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) 09:12:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) 09:12:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x2, 0x0, 0x61, 0x0, 0xd00}}, 0x0, 0x1, 0xc3, &(0x7f0000000480)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:12:50 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet_udp(0x2, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) 09:12:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r2, 0x2100}, {r2, 0x50}, {r2}, {r2, 0x10}, {r2, 0x2}, {r0, 0x100}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x3}, 0x8) 09:12:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) 09:12:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x261, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) 09:12:50 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000480)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) 09:12:51 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet_udp(0x2, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) [ 1182.607386] kauditd_printk_skb: 89 callbacks suppressed [ 1182.607402] audit: type=1400 audit(1555924371.131:6632): avc: denied { map } for pid=9831 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) r2 = gettid() wait4(r2, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1182.777718] audit: type=1400 audit(1555924371.141:6633): avc: denied { map } for pid=9831 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:51 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x8, 0x0, "8ba349636fdd1b0530fa46601aa6c8c6338880957c80b423"}) [ 1182.872889] audit: type=1400 audit(1555924371.141:6634): avc: denied { map } for pid=9831 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_udp(0x2, 0x2, 0x0) [ 1182.975690] audit: type=1400 audit(1555924371.141:6635): avc: denied { map } for pid=9831 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1183.154420] audit: type=1400 audit(1555924371.221:6636): avc: denied { map } for pid=9831 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:51 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet_udp(0x2, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) [ 1183.315545] audit: type=1400 audit(1555924371.281:6637): avc: denied { map } for pid=9831 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1183.462763] binder: 9866:9868 got new transaction with bad transaction stack, transaction 101 has target 9866:0 [ 1183.477762] net_ratelimit: 18 callbacks suppressed [ 1183.477771] protocol 88fb is buggy, dev hsr_slave_0 [ 1183.488007] protocol 88fb is buggy, dev hsr_slave_1 [ 1183.493286] protocol 88fb is buggy, dev hsr_slave_0 [ 1183.498542] protocol 88fb is buggy, dev hsr_slave_1 [ 1183.527802] audit: type=1400 audit(1555924371.301:6638): avc: denied { map } for pid=9831 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1183.578988] binder: 9866:9868 transaction failed 29201/-71, size 0-0 line 2882 09:12:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x261, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) [ 1183.634444] binder: release 9866:9868 transaction 101 out, still active [ 1183.665156] audit: type=1400 audit(1555924371.371:6639): avc: denied { map } for pid=9831 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1183.679437] binder: undelivered TRANSACTION_COMPLETE [ 1183.737491] binder: undelivered TRANSACTION_ERROR: 29201 09:12:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) wait4(0x0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1183.805428] audit: type=1400 audit(1555924371.421:6640): avc: denied { map } for pid=9831 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1183.947754] audit: type=1400 audit(1555924371.481:6641): avc: denied { map } for pid=9831 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:52 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x8, 0x0, "8ba349636fdd1b0530fa46601aa6c8c6338880957c80b423"}) 09:12:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 09:12:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) [ 1184.277738] protocol 88fb is buggy, dev hsr_slave_0 [ 1184.282882] protocol 88fb is buggy, dev hsr_slave_1 [ 1184.288108] protocol 88fb is buggy, dev hsr_slave_0 [ 1184.293232] protocol 88fb is buggy, dev hsr_slave_1 09:12:53 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000480)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 1184.551038] binder: send failed reply for transaction 101, target dead [ 1184.597765] protocol 88fb is buggy, dev hsr_slave_0 [ 1184.602955] protocol 88fb is buggy, dev hsr_slave_1 09:12:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000b40)="b43e7a105d97b1c13c13b25b7fc25e44", 0x10}], 0x1) readv(r1, &(0x7f0000000b00)=[{&(0x7f0000000180)=""/107, 0x6b}], 0x1) 09:12:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) wait4(0x0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:12:53 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x8, 0x0, "8ba349636fdd1b0530fa46601aa6c8c6338880957c80b423"}) 09:12:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000240)={r0}) 09:12:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) [ 1185.595218] binder: 10008:10009 got new transaction with bad transaction stack, transaction 104 has target 10008:0 09:12:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000540)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x1, 0x80000001, {"63038939f5ea74a5b359fbeb0e7f1a65"}, 0x9, 0xfa5, 0x4}}}, 0x90) wait4(0x0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1185.678519] binder: 10008:10009 transaction failed 29201/-71, size 0-0 line 2882 09:12:54 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x8, 0x0, "8ba349636fdd1b0530fa46601aa6c8c6338880957c80b423"}) [ 1185.758366] binder: release 10008:10009 transaction 104 out, still active [ 1185.771481] binder: undelivered TRANSACTION_COMPLETE [ 1185.797558] binder: undelivered TRANSACTION_ERROR: 29201 09:12:54 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000480)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 1185.839525] binder: send failed reply for transaction 104, target dead 09:12:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:12:54 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) 09:12:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000b40)="b43e7a105d97b1c13c13b25b7fc25e44", 0x10}], 0x1) readv(r1, &(0x7f0000000b00)=[{&(0x7f0000000180)=""/107, 0x6b}], 0x1) 09:12:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:12:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x7, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000080)="35f975b1484c66", 0x0, 0x0, 0x0, 0x0, 0x0}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) 09:12:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:12:55 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x101, 0x0) 09:12:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000b40)="b43e7a105d97b1c13c13b25b7fc25e44", 0x10}], 0x1) readv(r1, &(0x7f0000000b00)=[{&(0x7f0000000180)=""/107, 0x6b}], 0x1) 09:12:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:12:55 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000480)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 1187.627813] kauditd_printk_skb: 92 callbacks suppressed [ 1187.627829] audit: type=1400 audit(1555924376.151:6734): avc: denied { map } for pid=10238 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:12:56 executing program 1: openat$hwrng(0xffffffffffffff9c, 0x0, 0x101, 0x0) [ 1187.797894] audit: type=1400 audit(1555924376.191:6735): avc: denied { map } for pid=10245 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1187.935568] audit: type=1400 audit(1555924376.191:6736): avc: denied { map } for pid=10245 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) [ 1188.073146] audit: type=1400 audit(1555924376.261:6737): avc: denied { map } for pid=10245 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.242042] audit: type=1400 audit(1555924376.261:6738): avc: denied { map } for pid=10245 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:12:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000b40)="b43e7a105d97b1c13c13b25b7fc25e44", 0x10}], 0x1) readv(r1, &(0x7f0000000b00)=[{&(0x7f0000000180)=""/107, 0x6b}], 0x1) [ 1188.392683] audit: type=1400 audit(1555924376.911:6739): avc: denied { map } for pid=10293 comm="syz-executor.0" path="/dev/binder0" dev="devtmpfs" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 09:12:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe4000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}) [ 1188.543807] audit: type=1400 audit(1555924377.041:6740): avc: denied { set_context_mgr } for pid=10293 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 09:12:57 executing program 1: openat$hwrng(0xffffffffffffff9c, 0x0, 0x101, 0x0) 09:12:57 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = gettid() wait4(r0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1188.679547] audit: type=1400 audit(1555924377.131:6741): avc: denied { map } for pid=10359 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.757769] net_ratelimit: 22 callbacks suppressed [ 1188.757778] protocol 88fb is buggy, dev hsr_slave_0 [ 1188.768047] protocol 88fb is buggy, dev hsr_slave_1 [ 1188.770082] audit: type=1400 audit(1555924377.141:6742): avc: denied { map } for pid=10359 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.917797] audit: type=1400 audit(1555924377.151:6743): avc: denied { map } for pid=10359 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.997743] protocol 88fb is buggy, dev hsr_slave_0 [ 1189.002975] protocol 88fb is buggy, dev hsr_slave_1 09:12:57 executing program 0: socket$alg(0x26, 0x5, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) syz_open_procfs(0x0, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0x3e6, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 09:12:57 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r1, 0x0, 0xfffffffffffffc55, 0x0, 0x0, 0x71) bind$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x0, @mcast2, 0x3}}, 0x24) 09:12:58 executing program 1: openat$hwrng(0xffffffffffffff9c, 0x0, 0x101, 0x0) [ 1189.717735] protocol 88fb is buggy, dev hsr_slave_0 [ 1189.722968] protocol 88fb is buggy, dev hsr_slave_1 [ 1189.728292] protocol 88fb is buggy, dev hsr_slave_0 [ 1189.733478] protocol 88fb is buggy, dev hsr_slave_1 09:12:58 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = gettid() wait4(r0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:12:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:12:58 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) 09:12:59 executing program 4: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x2081f9) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x0, 0x11, r1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) request_key(&(0x7f0000000600)='trusted\x00', &(0x7f0000000640)={'syz'}, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000300)=ANY=[], 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) fadvise64(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000001180)='./bus\x00', 0x0) ftruncate(r3, 0x208200) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x4) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) [ 1190.517745] protocol 88fb is buggy, dev hsr_slave_0 [ 1190.522906] protocol 88fb is buggy, dev hsr_slave_1 09:12:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x800) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000240)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x91) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 09:12:59 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = gettid() wait4(r0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:12:59 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r1, 0x0, 0xfffffffffffffc55, 0x0, 0x0, 0x71) bind$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x0, @mcast2, 0x3}}, 0x24) 09:12:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:12:59 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) 09:13:00 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = gettid() wait4(r0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:13:00 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r1, 0x0, 0xfffffffffffffc55, 0x0, 0x0, 0x71) bind$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x0, @mcast2, 0x3}}, 0x24) 09:13:00 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 09:13:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x0) lseek(r1, 0x0, 0x4) 09:13:00 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) 09:13:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:13:01 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = gettid() wait4(r0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1192.695001] kauditd_printk_skb: 74 callbacks suppressed [ 1192.695017] audit: type=1400 audit(1555924381.221:6818): avc: denied { map } for pid=11107 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1192.811040] audit: type=1400 audit(1555924381.301:6819): avc: denied { map } for pid=11107 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1192.936275] audit: type=1400 audit(1555924381.301:6820): avc: denied { map } for pid=11107 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1193.079190] audit: type=1400 audit(1555924381.321:6821): avc: denied { map } for pid=11107 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1193.231806] audit: type=1400 audit(1555924381.381:6822): avc: denied { map } for pid=11107 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:01 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x100000f, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) ftruncate(r1, 0x48201) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x2000) [ 1193.351506] audit: type=1400 audit(1555924381.431:6823): avc: denied { map } for pid=11107 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:01 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r1, 0x0, 0xfffffffffffffc55, 0x0, 0x0, 0x71) bind$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x0, @mcast2, 0x3}}, 0x24) [ 1193.488251] audit: type=1400 audit(1555924381.441:6824): avc: denied { map } for pid=11107 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:13:02 executing program 0: openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0x0) gettid() getpgid(0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x1f000000) dup(0xffffffffffffff9c) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) msgget(0x2, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) lsetxattr$trusted_overlay_redirect(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RSTAT(r2, &(0x7f00000000c0)={0x51, 0x7d, 0x0, {0x0, 0x4a, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb, '/dev/loop#\x00', 0x0, '', 0x1, '*', 0xb, '/dev/loop#\x00'}}, 0x51) sendfile(r2, r2, &(0x7f0000000140), 0x7fff) llistxattr(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) [ 1193.683310] audit: type=1400 audit(1555924381.511:6825): avc: denied { map } for pid=11107 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rseq(0x0, 0x7d, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x80000) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000040)={0x3000, 0xa000}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xfffffffffffffe86, 0x0, 0x0, 0x0) 09:13:02 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = gettid() wait4(r0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1193.865526] audit: type=1400 audit(1555924381.511:6826): avc: denied { map } for pid=11107 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1193.890031] net_ratelimit: 18 callbacks suppressed [ 1193.890041] protocol 88fb is buggy, dev hsr_slave_0 [ 1193.890103] protocol 88fb is buggy, dev hsr_slave_1 [ 1193.890201] protocol 88fb is buggy, dev hsr_slave_0 [ 1193.890295] protocol 88fb is buggy, dev hsr_slave_1 [ 1194.109918] audit: type=1400 audit(1555924381.591:6827): avc: denied { map } for pid=11107 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:13:03 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') pread64(r0, 0x0, 0x1b9, 0x23db) 09:13:03 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = gettid() wait4(r0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1194.677745] protocol 88fb is buggy, dev hsr_slave_0 [ 1194.682899] protocol 88fb is buggy, dev hsr_slave_1 [ 1194.688129] protocol 88fb is buggy, dev hsr_slave_0 [ 1194.693240] protocol 88fb is buggy, dev hsr_slave_1 09:13:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="00db9210189b6d64be427b4f41", 0xd) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1e) fcntl$setstatus(r1, 0x4, 0x42803) 09:13:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setrlimit(0x40000000000008, &(0x7f0000000040)={0x484b, 0xfffffffffffff001}) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)) mlock(&(0x7f0000008000/0x2000)=nil, 0x2000) mlock(&(0x7f0000006000/0x3000)=nil, 0x3000) [ 1194.997743] protocol 88fb is buggy, dev hsr_slave_0 [ 1195.002905] protocol 88fb is buggy, dev hsr_slave_1 09:13:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:13:03 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/100, 0x64) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f0c3c123f319bd070") ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000240)) close(r0) 09:13:04 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = gettid() wait4(r0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bc070") r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) prctl$PR_SET_NAME(0xf, &(0x7f00000003c0)='em1ppr0ScpusftsysL\xc5\xf9z') 09:13:04 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = gettid() wait4(r0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:13:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x97cb06ebee444840, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000003ec0)='bbr\x00', 0x6170674a17967b03) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRESOCT], 0x321) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000002700)=""/228, 0xe4}], 0x1}}, {{&(0x7f00000038c0)=@nfc, 0x80, &(0x7f0000003b00)=[{&(0x7f0000003940)=""/201, 0xc9}, {&(0x7f0000003a40)=""/131, 0x83}], 0x2}, 0x8}], 0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='veno\x00', 0x5) sendto$inet(r0, &(0x7f00000005c0)="03f4a2c970de1d9c3776a9481255ced5dbc57fe63cd931916a02bae17f7850aea473b1c2395dcc0f572febcadeb7fa0f2ee9dc78ccc69169ccfc0bf46dbaba25f3f5a75b77654c0cb9989ea026da080991348232bc2541328a29ec7e", 0x5c, 0x0, 0x0, 0x0) 09:13:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) mlockall(0x3) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:13:05 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000000000)="240000001800030307fffd946fa200001c140000fe0301ff031d8568791ba3a2d188527e", 0x24}], 0x1}, 0x0) 09:13:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:13:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000410000/0x1000)=nil) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 1197.714788] kauditd_printk_skb: 82 callbacks suppressed [ 1197.714804] audit: type=1400 audit(1555924386.241:6910): avc: denied { map } for pid=12189 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1197.859602] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1197.866073] audit: type=1400 audit(1555924386.331:6911): avc: denied { map } for pid=12189 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) [ 1197.978074] audit: type=1400 audit(1555924386.351:6912): avc: denied { map } for pid=12189 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.073682] audit: type=1400 audit(1555924386.441:6913): avc: denied { map } for pid=12189 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:06 executing program 1: clone(0x802102009ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) 09:13:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1198.289700] audit: type=1400 audit(1555924386.471:6914): avc: denied { map } for pid=12189 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.555517] audit: type=1400 audit(1555924386.501:6915): avc: denied { map } for pid=12189 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @initdev}, 0x52) listen(r1, 0x7fe) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000000c0)=0x5, 0x4) sendmmsg$alg(r2, &(0x7f0000008280)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)='8', 0x1}], 0x1}], 0x1, 0x0) [ 1198.777350] audit: type=1400 audit(1555924386.501:6916): avc: denied { map } for pid=12189 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.865454] audit: type=1400 audit(1555924386.541:6917): avc: denied { map } for pid=12230 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.960983] audit: type=1400 audit(1555924386.541:6918): avc: denied { map } for pid=12230 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) [ 1199.070332] audit: type=1400 audit(1555924386.571:6919): avc: denied { map } for pid=12230 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1199.158614] net_ratelimit: 22 callbacks suppressed [ 1199.158696] protocol 88fb is buggy, dev hsr_slave_0 [ 1199.169879] protocol 88fb is buggy, dev hsr_slave_1 09:13:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1199.261114] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 1199.397897] protocol 88fb is buggy, dev hsr_slave_0 [ 1199.403310] protocol 88fb is buggy, dev hsr_slave_1 09:13:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x0, &(0x7f00000000c0)=""/4096, &(0x7f00000020c0)=0x1000) [ 1200.117736] protocol 88fb is buggy, dev hsr_slave_0 [ 1200.123048] protocol 88fb is buggy, dev hsr_slave_1 [ 1200.128393] protocol 88fb is buggy, dev hsr_slave_0 [ 1200.133632] protocol 88fb is buggy, dev hsr_slave_1 09:13:08 executing program 2: setrlimit(0x40000000000008, &(0x7f0000000000)) mlock(&(0x7f0000000000/0x1000)=nil, 0x1000) capset(&(0x7f0000001140)={0x19980330}, &(0x7f00009b3000)) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000003000/0x3000)=nil) 09:13:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000300)='xfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:13:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:13:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:08 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1e) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0ad401003c123f319bd070") keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) 09:13:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) [ 1200.917730] protocol 88fb is buggy, dev hsr_slave_0 [ 1200.922883] protocol 88fb is buggy, dev hsr_slave_1 09:13:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) geteuid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x6) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x6) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000000)={0xffffffffffffff1b, 0x12, 0x100000000004002, {0x5}}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(r0, r1) add_key(0x0, 0x0, &(0x7f00000000c0)="21055938ad15812606bc1a26352c0c24139bd5906633e2b8968f945f227a4a1d18ba2b1eb4d284df159beeb3c2613427e30a684706e23274ae733855f3433ae5dfdb9ebc61b0fda76a2fb311896c5b7bcf44db157afdb3bc7721d7bf985e873f07ac0a92f4619c8ed08336110d4665a1ae65", 0x72, 0xfffffffffffffffb) [ 1201.056149] XFS (loop1): Invalid superblock magic number 09:13:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:09 executing program 1: r0 = socket(0x2000000000000010, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 09:13:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:13:10 executing program 2: setrlimit(0x40000000000008, &(0x7f0000000000)) mlock(&(0x7f0000000000/0x1000)=nil, 0x1000) capset(&(0x7f0000001140)={0x19980330}, &(0x7f00009b3000)) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000003000/0x3000)=nil) 09:13:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x6) flock(r1, 0xa) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf011, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 09:13:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:10 executing program 1: r0 = socket(0x2000000000000010, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 09:13:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x80000) 09:13:11 executing program 2: setrlimit(0x40000000000008, &(0x7f0000000000)) mlock(&(0x7f0000000000/0x1000)=nil, 0x1000) capset(&(0x7f0000001140)={0x19980330}, &(0x7f00009b3000)) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000003000/0x3000)=nil) [ 1202.857393] kauditd_printk_skb: 77 callbacks suppressed [ 1202.857409] audit: type=1400 audit(1555924391.381:6997): avc: denied { map } for pid=13175 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.029214] audit: type=1400 audit(1555924391.441:6998): avc: denied { map } for pid=13175 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1203.197720] audit: type=1400 audit(1555924391.451:6999): avc: denied { map } for pid=13175 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000fbe000)={0x0, 0x0}, 0x10) [ 1203.328963] audit: type=1400 audit(1555924391.451:7000): avc: denied { map } for pid=13175 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.490928] audit: type=1400 audit(1555924391.541:7001): avc: denied { map } for pid=13175 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.645813] audit: type=1400 audit(1555924391.621:7002): avc: denied { map } for pid=13175 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.827258] audit: type=1400 audit(1555924391.621:7003): avc: denied { map } for pid=13175 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:12 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0x9, @raw_data="65959c3418b0a8484e56363107000000fe7eadc4e5efe4eb08b2818231f0b171d01a6ccab9aa61f9334780ee00617fd51776eba2ff6638152706d334b8c317bd72cb367b00b738a668c1f265769a8b83bdfba7f2a6a533f765362117325765424a42ff769cc614819d4ffe8bb06797edd61780727c8acae9d1114979bc5a6df889dd78b39d1456720c394c7d690a6659812de9ef718772c8b725bccea7fa69346c281c827ab34639f139b818aeb4219bb23f6072e27fa590731d28c92807ba70d895fb32d01fb64a"}) 09:13:12 executing program 2: setrlimit(0x40000000000008, &(0x7f0000000000)) mlock(&(0x7f0000000000/0x1000)=nil, 0x1000) capset(&(0x7f0000001140)={0x19980330}, &(0x7f00009b3000)) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000003000/0x3000)=nil) [ 1203.963310] audit: type=1400 audit(1555924391.691:7004): avc: denied { map } for pid=13175 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1204.092548] audit: type=1400 audit(1555924391.691:7005): avc: denied { map } for pid=13175 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:12 executing program 1: r0 = socket(0x2000000000000010, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) [ 1204.277746] net_ratelimit: 18 callbacks suppressed [ 1204.277756] protocol 88fb is buggy, dev hsr_slave_0 [ 1204.279490] audit: type=1400 audit(1555924391.791:7006): avc: denied { map } for pid=13175 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1204.282906] protocol 88fb is buggy, dev hsr_slave_1 [ 1204.318151] protocol 88fb is buggy, dev hsr_slave_0 09:13:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) [ 1204.323408] protocol 88fb is buggy, dev hsr_slave_1 09:13:13 executing program 0: sync_file_range(0xffffffffffffffff, 0x80000001, 0xffffffffffffff81, 0x0) 09:13:13 executing program 1: r0 = socket(0x2000000000000010, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000f003693e0000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe000000070002000000000000006c6c256f1a272f900e2e117c22efc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2c000005deef11a822c9afea7dc2add7f671fd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d09b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8", 0xfc) 09:13:13 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TIOCSTI(r0, 0x40046f41, 0x715000) [ 1205.077779] protocol 88fb is buggy, dev hsr_slave_0 [ 1205.082943] protocol 88fb is buggy, dev hsr_slave_1 [ 1205.088192] protocol 88fb is buggy, dev hsr_slave_0 [ 1205.093307] protocol 88fb is buggy, dev hsr_slave_1 09:13:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="8d367a010fe1", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) 09:13:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) [ 1205.397798] protocol 88fb is buggy, dev hsr_slave_0 [ 1205.402948] protocol 88fb is buggy, dev hsr_slave_1 09:13:14 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="e22a7f39c664"], 0x6) write$P9_RREAD(r0, &(0x7f0000000080)={0xc0, 0x75, 0x0, {0xb5, "2e63e183bcd44d49efc7c4448a2519ea789452975668d5df634c79de467ccd9680f7ab812d0e7b5853ae13d5e0106eb14ffa4ba62844d61202d4a4088531995f471fcd3c24cbacb7e0c3eb1389180f1e1ba063439db928d37ceaeb65653b6b0de56b701273f654c3814f12b939f7417fc209aac5255f04fb9beaccb6edf9840ea578b4daa6a71ec173aab042a0e86a708e3ffc603d51717b779d3883fe132249eeb80bdcf1ef7ec7b780002d3509c20196ef829925"}}, 0xc0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:13:14 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1, 0x0, 0x0, 0xec03000000000000}, 0x0) 09:13:14 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000380)) 09:13:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) 09:13:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="8d367a010fe1", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) 09:13:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 09:13:15 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 09:13:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="8d367a010fe1", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) 09:13:16 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x1ff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:13:16 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d:::,0::b:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 1207.859859] kauditd_printk_skb: 83 callbacks suppressed [ 1207.859875] audit: type=1400 audit(1555924396.391:7090): avc: denied { map } for pid=13983 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1208.038505] audit: type=1400 audit(1555924396.391:7091): avc: denied { map } for pid=13983 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.185295] audit: type=1400 audit(1555924396.401:7092): avc: denied { map } for pid=13983 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.340240] audit: type=1400 audit(1555924396.401:7093): avc: denied { map } for pid=13983 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.486844] audit: type=1400 audit(1555924396.411:7094): avc: denied { map } for pid=13983 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) [ 1208.608093] audit: type=1400 audit(1555924396.421:7095): avc: denied { map } for pid=13983 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.763095] libceph: resolve 'd' (ret=-3): failed [ 1208.788072] audit: type=1400 audit(1555924396.671:7096): avc: denied { map } for pid=14006 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.830952] libceph: parse_ips bad ip '[d:::,0::b' [ 1208.927949] audit: type=1400 audit(1555924396.771:7097): avc: denied { map } for pid=14006 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="8d367a010fe1", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) [ 1209.086659] audit: type=1400 audit(1555924396.771:7098): avc: denied { map } for pid=14006 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1209.232328] audit: type=1400 audit(1555924396.771:7099): avc: denied { map } for pid=14006 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:17 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={{0x6, @rose}, [@default, @remote, @rose, @remote, @bcast, @remote, @netrom, @netrom]}, 0x48) 09:13:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r1, 0x65, 0x6, &(0x7f0000cbc000)=""/244, &(0x7f0000000340)=0xf4) 09:13:18 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="a1bf6b03276d8e60c77d99e52eecee7e05efa2fa52119cfcf36ffc0b99bc1c37", 0x20, 0xfffffffffffffffc) [ 1209.557752] net_ratelimit: 22 callbacks suppressed [ 1209.557761] protocol 88fb is buggy, dev hsr_slave_0 [ 1209.568377] protocol 88fb is buggy, dev hsr_slave_1 [ 1209.797779] protocol 88fb is buggy, dev hsr_slave_0 [ 1209.803517] protocol 88fb is buggy, dev hsr_slave_1 09:13:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:18 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="24000000020207031b09000b00d711f2c70c1b05e90308ff7e0000000000000000000100", 0x24}], 0x1}, 0x0) 09:13:18 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$VIDIOC_G_PRIORITY(0xffffffffffffffff, 0x80045643, 0x0) unshare(0x40000000) 09:13:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) [ 1210.517789] protocol 88fb is buggy, dev hsr_slave_0 [ 1210.523141] protocol 88fb is buggy, dev hsr_slave_1 [ 1210.528634] protocol 88fb is buggy, dev hsr_slave_0 [ 1210.533849] protocol 88fb is buggy, dev hsr_slave_1 09:13:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x20000000000000f, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000015000)=0x1004, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) 09:13:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x18, &(0x7f00000009c0)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, 0x0, 0x0}, 0x200) 09:13:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1211.098904] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:13:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x6) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) fcntl$setsig(r0, 0xa, 0x1d) sendto(r0, &(0x7f0000000200)='1', 0x1, 0x0, 0x0, 0x0) 09:13:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) [ 1211.317735] protocol 88fb is buggy, dev hsr_slave_0 [ 1211.322951] protocol 88fb is buggy, dev hsr_slave_1 09:13:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) 09:13:20 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 09:13:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x801, 0x0) getsockopt$sock_buf(r1, 0x1, 0xc, &(0x7f0000499000)=""/35, &(0x7f000020a000)=0x23e) 09:13:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x18, &(0x7f00000009c0)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, 0x0, 0x0}, 0x200) 09:13:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) 09:13:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1212.870033] kauditd_printk_skb: 79 callbacks suppressed [ 1212.870050] audit: type=1400 audit(1555924401.401:7179): avc: denied { map } for pid=15215 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x44}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x29) [ 1213.048915] audit: type=1400 audit(1555924401.471:7180): avc: denied { map } for pid=15215 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:21 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e000a800d0000005e510befccd7", 0x2e}], 0x1}, 0x0) [ 1213.163267] audit: type=1400 audit(1555924401.511:7181): avc: denied { map } for pid=15215 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1213.368595] audit: type=1400 audit(1555924401.531:7182): avc: denied { map } for pid=15215 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1213.500660] audit: type=1400 audit(1555924401.571:7183): avc: denied { map } for pid=15215 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:22 executing program 5: getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='securityfs\x00', 0x2100000, &(0x7f0000000700)='[trusted/\x00') mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='fuseblk\x00', 0x1, &(0x7f0000000600)='wlan0++\x00') [ 1213.707704] audit: type=1400 audit(1555924401.611:7184): avc: denied { map } for pid=15215 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1213.842572] audit: type=1400 audit(1555924401.671:7185): avc: denied { map } for pid=15215 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1213.942648] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 09:13:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = gettid() wait4(r1, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1213.981647] audit: type=1400 audit(1555924401.671:7186): avc: denied { map } for pid=15215 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1214.014871] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 09:13:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilter\x00\x92\x90e\xf1e\b\xbeb\b\'\x18i\x98\b\xb4wu\x8b5\xf0c\xec\x00\xd8\x11\x0e\xdf\x9d\xaf\xf8\xfb\xe4\xfebm\xdfi\xc4\x01<\x9cP\xa1\xb9\xd5\x89\x063\x96%\xfc\xa1c\xe6\xb9\x8aU\xd9\xc0\xc6J\xa3\xe2\x05\xfcdd\xb3a\x83\x95\xaa\x1d\xde\x89u\xf9\xc3*V\xe7\x82+M\xf4\xc0v`_\x1c\x9b\tv\xeep7\x99m\xb4\f\xa5\xb4\xfa\xbb\x93\xdftT\xf2\x98\xbfA1\xf6\x9a\x19$\r?\xcb\x04\xd5\xc1\'\xd3\xc4{\f\x15X\xde_\x02\x9cw\xde}n\xc8\x8a\x12\x1e@\xf9\xed3\xd4p\xfc[\x93_\x1e\xf4\x01%4\x9f\xf6\";\xedG`\x97bK\x88j\x9eP\xeaU$7\xcf\xb7\xefuc\xed\xd5\x18\xfcK\xd5\xa8p\xe1\x81\xac\xc7\xd1\x11h\xef\xceP\xa3\xb0\v\xc8)\xf0\xa1q1\xe1\xef\xf5c)\x8e}]u\xa3\x8f\xea6\x10\xd4D\x9f\xe7\x84M.\xc9\x02j\f\xc7S\b\r\xbc\xf9\x19\xd3\xfaH\xc6\x92\x97\x8b\tX\xc4\xb9\xb2\xcfM1\xae\xa4l+D\xfb\xdc=(\xcal\x99g\x81\x95\x96\xe5\xf9\xe6\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 09:13:22 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e000a800d0000005e510befccd7", 0x2e}], 0x1}, 0x0) [ 1214.194617] audit: type=1400 audit(1555924402.181:7187): avc: denied { map } for pid=15257 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:22 executing program 4: semget(0x1, 0x0, 0x0) [ 1214.326625] audit: type=1400 audit(1555924402.181:7188): avc: denied { map } for pid=15257 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x18, &(0x7f00000009c0)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, 0x0, 0x0}, 0x200) [ 1214.677746] net_ratelimit: 18 callbacks suppressed [ 1214.677755] protocol 88fb is buggy, dev hsr_slave_0 [ 1214.689371] protocol 88fb is buggy, dev hsr_slave_1 [ 1214.694662] protocol 88fb is buggy, dev hsr_slave_0 [ 1214.700065] protocol 88fb is buggy, dev hsr_slave_1 09:13:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") gettid() wait4(0x0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) 09:13:23 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x1, 0x2) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)='N', 0x1}], 0x1) [ 1215.255732] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1215.297854] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 09:13:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x18, &(0x7f00000009c0)=@nat={'nat\x00', 0x19, 0x1, 0x0, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, 0x0, 0x0}, 0x200) [ 1215.477746] protocol 88fb is buggy, dev hsr_slave_0 [ 1215.483221] protocol 88fb is buggy, dev hsr_slave_1 [ 1215.488600] protocol 88fb is buggy, dev hsr_slave_0 [ 1215.493844] protocol 88fb is buggy, dev hsr_slave_1 09:13:24 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e000a800d0000005e510befccd7", 0x2e}], 0x1}, 0x0) 09:13:24 executing program 5: setresuid(0x0, 0xee01, 0x0) r0 = add_key(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x4, r0, 0xffffffdfffffffff) [ 1215.797744] protocol 88fb is buggy, dev hsr_slave_0 [ 1215.803315] protocol 88fb is buggy, dev hsr_slave_1 09:13:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') readv(r0, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/186, 0xba}, {&(0x7f0000000180)=""/176, 0xb0}], 0x2) 09:13:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") gettid() wait4(0x0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1216.234554] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1216.269309] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 09:13:24 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e000a800d0000005e510befccd7", 0x2e}], 0x1}, 0x0) 09:13:25 executing program 4: clone(0x107fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='environ\x00') exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') read(r0, 0x0, 0x0) 09:13:25 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/\x0f@\xba\x89re_tu\x00ne\x91R\xcf\xbc\xc4VR\xc6\x03\x8b\x9a\x05Pr\x96\xe8{\xa6\xcd[\xab\xa3\xd4<\x1d\xc0\x82:4\xb8\vD\xaa0$\b3r*e\xf32\xc7x\xfd\f\xf0p*8\xca\xf0\x94n\xef\xa3iO\x04\x0e\x1f\xb9\x83\xc5\xec1s\x1f\x8d\xe6s-\x16\xb9\x0e\\\xee\x00\x00\x00\x00', 0x2, 0x0) getsockname$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') bind$inet(r0, &(0x7f0000000400)={0x2, 0x4e24, @empty}, 0x10) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000000500)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r1, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"/1358], 0x54e) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0xe04b, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) lgetxattr(0x0, 0x0, 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x380531a9) 09:13:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") gettid() wait4(0x0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) [ 1217.320198] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1217.387885] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 09:13:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) 09:13:26 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x208d43, 0x25, 0x0, 0xffffffffffffff9c}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x800001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000200)={0x0, 0x0, 0x4}) ppoll(&(0x7f0000000140)=[{}], 0xd8, 0x0, 0x0, 0x0) [ 1217.905000] kauditd_printk_skb: 81 callbacks suppressed [ 1217.905016] audit: type=1400 audit(1555924406.431:7271): avc: denied { map } for pid=16004 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:26 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x740000, 0xffffffff7ff0bdbe}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x4008550c, 0x0) [ 1218.096372] audit: type=1400 audit(1555924406.421:7270): avc: denied { read } for pid=15991 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1218.216528] audit: type=1400 audit(1555924406.481:7272): avc: denied { create } for pid=15991 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:13:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = gettid() wait4(r1, 0x0, 0x2, &(0x7f0000000100)) [ 1218.373135] audit: type=1400 audit(1555924406.491:7274): avc: denied { map } for pid=16004 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.478606] audit: type=1400 audit(1555924406.511:7275): avc: denied { map } for pid=16004 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x9}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000000c0)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1218.604629] audit: type=1400 audit(1555924406.511:7276): avc: denied { map } for pid=16004 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) 09:13:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000140)={@multicast2, @dev={0xac, 0x14, 0x14, 0x10}}, 0x8) [ 1218.742133] audit: type=1400 audit(1555924406.491:7273): avc: denied { write } for pid=15991 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1218.880442] audit: type=1400 audit(1555924406.551:7277): avc: denied { map } for pid=16004 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.993441] audit: type=1400 audit(1555924406.571:7278): avc: denied { read } for pid=15991 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1219.125688] audit: type=1400 audit(1555924406.601:7279): avc: denied { map } for pid=16004 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = gettid() wait4(r1, 0x0, 0x0, &(0x7f0000000100)) 09:13:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000400)={0x2, 0x0, @initdev}, &(0x7f0000000500)=0x10, 0x80000) r0 = dup(0xffffffffffffffff) bind$inet(r0, 0x0, 0x0) timer_create(0x5, &(0x7f00000005c0)={0x0, 0x24, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000700)) timer_create(0x0, 0x0, &(0x7f00000007c0)) timer_create(0x4, &(0x7f0000000800)={0x0, 0xb, 0x4}, &(0x7f0000000840)) timer_create(0x4, &(0x7f0000000a80)={0x0, 0xf, 0x2, @thr={&(0x7f0000000880), 0x0}}, 0x0) timer_create(0x0, 0x0, 0x0) timer_create(0x7, 0x0, 0x0) timer_getoverrun(0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000440)=""/174) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x10) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 09:13:28 executing program 0: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x1) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000380)=""/4096) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 09:13:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) 09:13:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x800452d3, 0x0) [ 1219.957734] net_ratelimit: 22 callbacks suppressed [ 1219.957744] protocol 88fb is buggy, dev hsr_slave_0 [ 1219.968075] protocol 88fb is buggy, dev hsr_slave_1 09:13:28 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) [ 1220.197765] protocol 88fb is buggy, dev hsr_slave_0 [ 1220.202999] protocol 88fb is buggy, dev hsr_slave_1 09:13:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = gettid() wait4(r1, 0x0, 0x0, 0x0) 09:13:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) [ 1220.917734] protocol 88fb is buggy, dev hsr_slave_0 [ 1220.923003] protocol 88fb is buggy, dev hsr_slave_1 [ 1220.928369] protocol 88fb is buggy, dev hsr_slave_0 [ 1220.933577] protocol 88fb is buggy, dev hsr_slave_1 09:13:29 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000400)={0x2, 0x0, @initdev}, &(0x7f0000000500)=0x10, 0x80000) r0 = dup(0xffffffffffffffff) bind$inet(r0, 0x0, 0x0) timer_create(0x5, &(0x7f00000005c0)={0x0, 0x24, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000700)) timer_create(0x0, 0x0, &(0x7f00000007c0)) timer_create(0x4, &(0x7f0000000800)={0x0, 0xb, 0x4}, &(0x7f0000000840)) timer_create(0x4, &(0x7f0000000a80)={0x0, 0xf, 0x2, @thr={&(0x7f0000000880), 0x0}}, 0x0) timer_create(0x0, 0x0, 0x0) timer_create(0x7, 0x0, 0x0) timer_getoverrun(0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000440)=""/174) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x10) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 09:13:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006540)=ANY=[@ANYBLOB='data=ordered,lockproto=dlm,errors=withdraw,rgrplvb']) 09:13:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000780)=""/98, 0x62}], 0x2}}], 0x1, 0x0, 0x0) 09:13:30 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sync() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) add_key(&(0x7f0000001300)='big_key\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) ptrace(0x10, r0) keyctl$assume_authority(0x10, 0x0) ptrace(0x11, r0) [ 1221.717749] protocol 88fb is buggy, dev hsr_slave_0 [ 1221.722893] protocol 88fb is buggy, dev hsr_slave_1 09:13:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x8b}], 0x19, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/159}, {&(0x7f00000013c0)=""/4096}], 0xf3, 0x0) 09:13:30 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000500), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) 09:13:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x13, &(0x7f0000000000), 0x4) 09:13:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000400)={0x2, 0x0, @initdev}, &(0x7f0000000500)=0x10, 0x80000) r0 = dup(0xffffffffffffffff) bind$inet(r0, 0x0, 0x0) timer_create(0x5, &(0x7f00000005c0)={0x0, 0x24, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000700)) timer_create(0x0, 0x0, &(0x7f00000007c0)) timer_create(0x4, &(0x7f0000000800)={0x0, 0xb, 0x4}, &(0x7f0000000840)) timer_create(0x4, &(0x7f0000000a80)={0x0, 0xf, 0x2, @thr={&(0x7f0000000880), 0x0}}, 0x0) timer_create(0x0, 0x0, 0x0) timer_create(0x7, 0x0, 0x0) timer_getoverrun(0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000440)=""/174) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x10) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 09:13:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = memfd_create(&(0x7f0000000040)='.--posix_acl_a\x85\a\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) dup2(r2, r1) write$sndseq(r1, 0x0, 0x0) poll(&(0x7f0000000100)=[{r2}], 0x1, 0x3) [ 1222.922374] kauditd_printk_skb: 81 callbacks suppressed [ 1222.922391] audit: type=1400 audit(1555924411.451:7361): avc: denied { map } for pid=17464 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x800000409ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000080)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x200000000038) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="fa69be9cf99330fc730032833617336633fe653cf60000f80fa5035139ecfed73dd2b5be04bccf8e73aa7254d10800cae7fdc0fb0f3dcadcf3"], 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r1, 0x0, 0x0) 09:13:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5504, 0x0) [ 1223.423962] audit: type=1400 audit(1555924411.951:7362): avc: denied { map } for pid=17740 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1223.525617] audit: type=1400 audit(1555924411.981:7363): avc: denied { map } for pid=17749 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1223.668765] audit: type=1400 audit(1555924411.981:7364): avc: denied { map } for pid=17749 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1223.731342] audit: type=1400 audit(1555924411.981:7365): avc: denied { map } for pid=17740 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1223.781185] audit: type=1400 audit(1555924412.001:7366): avc: denied { map } for pid=17740 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000400)={0x2, 0x0, @initdev}, &(0x7f0000000500)=0x10, 0x80000) r0 = dup(0xffffffffffffffff) bind$inet(r0, 0x0, 0x0) timer_create(0x5, &(0x7f00000005c0)={0x0, 0x24, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000700)) timer_create(0x0, 0x0, &(0x7f00000007c0)) timer_create(0x4, &(0x7f0000000800)={0x0, 0xb, 0x4}, &(0x7f0000000840)) timer_create(0x4, &(0x7f0000000a80)={0x0, 0xf, 0x2, @thr={&(0x7f0000000880), 0x0}}, 0x0) timer_create(0x0, 0x0, 0x0) timer_create(0x7, 0x0, 0x0) timer_getoverrun(0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000440)=""/174) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x10) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 09:13:32 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000500), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) [ 1223.946435] audit: type=1400 audit(1555924412.011:7367): avc: denied { map } for pid=17740 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1224.108974] audit: type=1400 audit(1555924412.031:7368): avc: denied { map } for pid=17749 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@bridge_delneigh={0x24, 0x1d, 0x611, 0x0, 0x0, {0x2}, [@NDA_DST_IPV4={0x8, 0x1, @local}]}, 0x24}}, 0x0) 09:13:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = memfd_create(&(0x7f0000000040)='.--posix_acl_a\x85\a\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) dup2(r2, r1) write$sndseq(r1, 0x0, 0x0) poll(&(0x7f0000000100)=[{r2}], 0x1, 0x3) [ 1224.295818] audit: type=1400 audit(1555924412.031:7369): avc: denied { map } for pid=17749 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1224.420592] audit: type=1400 audit(1555924412.091:7370): avc: denied { map } for pid=17740 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:33 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 09:13:33 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000500), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) 09:13:33 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040), 0xa) 09:13:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = memfd_create(&(0x7f0000000040)='.--posix_acl_a\x85\a\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) dup2(r2, r1) write$sndseq(r1, 0x0, 0x0) poll(&(0x7f0000000100)=[{r2}], 0x1, 0x3) 09:13:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0xd, 0xf0ffff}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1225.077759] net_ratelimit: 18 callbacks suppressed [ 1225.077768] protocol 88fb is buggy, dev hsr_slave_0 [ 1225.088129] protocol 88fb is buggy, dev hsr_slave_1 [ 1225.093441] protocol 88fb is buggy, dev hsr_slave_0 [ 1225.098691] protocol 88fb is buggy, dev hsr_slave_1 09:13:33 executing program 4: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) r2 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x7ff) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) 09:13:34 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000500), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) [ 1225.848440] gretap0: refused to change device tx_queue_len [ 1225.854814] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 1225.877761] protocol 88fb is buggy, dev hsr_slave_0 [ 1225.882909] protocol 88fb is buggy, dev hsr_slave_1 [ 1225.888142] protocol 88fb is buggy, dev hsr_slave_0 [ 1225.893265] protocol 88fb is buggy, dev hsr_slave_1 [ 1225.939167] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1225.946019] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 09:13:34 executing program 2: r0 = socket$inet(0x10, 0x2, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000000a061f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 1226.008801] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1226.047134] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1226.079686] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1226.122597] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 09:13:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = memfd_create(&(0x7f0000000040)='.--posix_acl_a\x85\a\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) dup2(r2, r1) write$sndseq(r1, 0x0, 0x0) poll(&(0x7f0000000100)=[{r2}], 0x1, 0x3) [ 1226.165292] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1226.197800] protocol 88fb is buggy, dev hsr_slave_0 [ 1226.205383] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1226.242658] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1226.278143] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1226.332351] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1226.414122] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz1 [ 1226.496003] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1226.544277] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 09:13:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1226.593095] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1226.646304] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1226.694952] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1226.741324] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1226.796579] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1226.851276] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1226.883501] block nbd0: Receive control failed (result -22) [ 1226.893372] block nbd0: Receive control failed (result -22) [ 1226.910660] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1226.939928] block nbd0: shutting down sockets [ 1226.955656] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1227.003968] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1227.059602] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz1 09:13:35 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000002c0)="c4a295fa", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r0, &(0x7f0000000100)="ce041000001300000091", 0xa, 0x0, 0x0, 0x0) [ 1227.170673] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1227.207927] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 09:13:36 executing program 2: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffd}, 0x0, 0x8) timer_create(0xb, &(0x7f00000001c0)={0x0, 0x12, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x3, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080)={&(0x7f0000000140), 0x8}) 09:13:36 executing program 0: r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000200), 0x1000) 09:13:36 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040), 0xa) [ 1227.941348] kauditd_printk_skb: 78 callbacks suppressed [ 1227.941363] audit: type=1400 audit(1555924416.471:7449): avc: denied { map } for pid=18588 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1228.104249] audit: type=1400 audit(1555924416.521:7450): avc: denied { map } for pid=18588 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1228.250132] audit: type=1400 audit(1555924416.521:7451): avc: denied { map } for pid=18588 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:36 executing program 4: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) r2 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x7ff) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) [ 1228.406764] audit: type=1400 audit(1555924416.581:7452): avc: denied { map } for pid=18588 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1228.559163] audit: type=1400 audit(1555924416.631:7453): avc: denied { map } for pid=18588 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1228.830623] audit: type=1400 audit(1555924416.701:7454): avc: denied { map } for pid=18588 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1229.035979] audit: type=1400 audit(1555924416.701:7455): avc: denied { map } for pid=18588 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1229.061187] audit: type=1400 audit(1555924416.751:7456): avc: denied { map } for pid=18588 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1229.103128] audit: type=1400 audit(1555924416.771:7457): avc: denied { map } for pid=18588 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1229.128970] audit: type=1400 audit(1555924416.821:7458): avc: denied { map } for pid=18588 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:37 executing program 5: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) r2 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x7ff) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) 09:13:37 executing program 2: unshare(0x24020400) unshare(0x4020000) 09:13:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000540)=""/229) 09:13:38 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040), 0xa) [ 1229.493646] block nbd0: Receive control failed (result -22) [ 1229.509799] block nbd0: Receive control failed (result -22) [ 1229.539627] block nbd0: shutting down sockets 09:13:38 executing program 4: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) r2 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x7ff) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) 09:13:38 executing program 0: r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000200), 0x1000) [ 1230.357783] net_ratelimit: 23 callbacks suppressed [ 1230.357792] protocol 88fb is buggy, dev hsr_slave_0 [ 1230.367961] protocol 88fb is buggy, dev hsr_slave_1 [ 1230.399172] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1230.405936] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1230.453574] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1230.497848] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1230.539889] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1230.579930] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1230.597786] protocol 88fb is buggy, dev hsr_slave_0 [ 1230.603023] protocol 88fb is buggy, dev hsr_slave_1 [ 1230.627855] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1230.681375] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 09:13:39 executing program 5: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) r2 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x7ff) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) [ 1230.740693] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1230.785737] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1230.838429] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1230.883468] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz1 09:13:39 executing program 2: r0 = socket(0x10, 0x200000003, 0x0) sendmsg$nl_route(r0, &(0x7f0000504000)={0x0, 0x0, &(0x7f0000434ff0)={&(0x7f0000000000)=@setneightbl={0x1c, 0x43, 0x401, 0x0, 0x0, {0x2}, [@NDTA_NAME={0x8, 0x1, '\x00'}]}, 0x1c}}, 0x0) 09:13:39 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040), 0xa) 09:13:39 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000001180)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) shmctl$SHM_INFO(0x0, 0xe, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 1231.317759] protocol 88fb is buggy, dev hsr_slave_0 [ 1231.322990] protocol 88fb is buggy, dev hsr_slave_1 [ 1231.328350] protocol 88fb is buggy, dev hsr_slave_0 [ 1231.333545] protocol 88fb is buggy, dev hsr_slave_1 09:13:40 executing program 0: r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000200), 0x1000) 09:13:40 executing program 5: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) r2 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x7ff) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) 09:13:40 executing program 4: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) r2 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x7ff) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) [ 1231.888830] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1231.895698] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 09:13:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x10001, 0x0, 0xbe}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xa}) [ 1231.952587] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1231.996104] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1232.037186] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1232.077448] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1232.117738] protocol 88fb is buggy, dev hsr_slave_0 [ 1232.117913] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1232.122885] protocol 88fb is buggy, dev hsr_slave_1 [ 1232.181570] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1232.229329] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1232.266794] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1232.296854] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1232.333507] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz1] on syz1 09:13:40 executing program 3: creat(0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 09:13:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x2]}}}, @sadb_address={0x3, 0x8, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0xf0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 09:13:41 executing program 0: r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000200), 0x1000) [ 1232.988785] kauditd_printk_skb: 84 callbacks suppressed [ 1232.988801] audit: type=1400 audit(1555924421.521:7543): avc: denied { map } for pid=19753 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c000000000b0501ff0080fffdffff2e0a0000000c00010001faffff7c0a00010c000200000022ff02f10000"], 0x2c}}, 0x0) [ 1233.199536] audit: type=1400 audit(1555924421.551:7544): avc: denied { map } for pid=19753 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:41 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syncfs(r1) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) prctl$PR_SET_FPEMU(0xa, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x2, 0x0, 0xffffffffc496a437, 0x9, 0x9, 0x0, 0x0, 0x4}}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) syz_open_dev$dspn(0x0, 0xdcf, 0x402a01) ioctl$KVM_RUN(r4, 0xae80, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="737461636b203a3a00d09cd372c2ef5509db8ab24e300d5944df8f346497da98f0b453ad6d8a2fcb127375b2ae8bfc030e9a230514289d300b06774494f1ee8ad5379dfed204dd4ee8d1bb83d594cc2086c675750d4c2e9af281fa937d1b0100008000000000baec736202c183a1a0689c60948f3cd9c5f318fe02a98cbefad7c7e6f3f4cd05f5f1e0d23b6e3d245fc76153"], 0x1) [ 1233.386621] audit: type=1400 audit(1555924421.671:7545): avc: denied { map } for pid=19978 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1233.609396] audit: type=1400 audit(1555924421.691:7546): avc: denied { map } for pid=19978 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000000)=0x1, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 1233.827713] audit: type=1400 audit(1555924421.711:7547): avc: denied { map } for pid=19978 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1233.945546] audit: type=1400 audit(1555924421.721:7548): avc: denied { map } for pid=19978 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:42 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x1401, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) [ 1234.123392] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 1234.126527] audit: type=1400 audit(1555924421.811:7549): avc: denied { map } for pid=19978 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1234.262218] audit: type=1400 audit(1555924421.861:7550): avc: denied { map } for pid=19978 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1002, 0x0, 0x1012, r1, 0x0) [ 1234.377498] audit: type=1400 audit(1555924421.881:7551): avc: denied { map } for pid=19978 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1234.495564] audit: type=1400 audit(1555924421.961:7552): avc: denied { map } for pid=19978 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:43 executing program 3: creat(0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 09:13:43 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:13:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000800000010000340140000000000000037153e370000000060000000d1bd", 0x2e}], 0x1}, 0x0) 09:13:44 executing program 3: creat(0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) [ 1235.477737] net_ratelimit: 18 callbacks suppressed [ 1235.477747] protocol 88fb is buggy, dev hsr_slave_0 [ 1235.488111] protocol 88fb is buggy, dev hsr_slave_1 [ 1235.493409] protocol 88fb is buggy, dev hsr_slave_0 [ 1235.498656] protocol 88fb is buggy, dev hsr_slave_1 09:13:44 executing program 2: madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 09:13:44 executing program 1: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) r0 = accept4$tipc(0xffffffffffffff9c, 0x0, &(0x7f0000000200), 0x80000) fsetxattr$trusted_overlay_redirect(r0, 0x0, 0x0, 0x0, 0x3) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000002c0)=0x4) getpgrp(0xffffffffffffffff) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x1) fremovexattr(r2, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x0, 0x2}]}, 0x18, 0x0) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[0x0, &(0x7f0000000400)='security.capa%ility\x00', &(0x7f0000000440)='security.capability\x00'], &(0x7f0000000ac0)) 09:13:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000800000010000340140000000000000037153e370000000060000000d1bd", 0x2e}], 0x1}, 0x0) 09:13:44 executing program 5: ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffff) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='io.bfq.weight\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x30000000000) sendmsg$kcm(r1, &(0x7f00000018c0)={&(0x7f0000000400)=@l2={0x1f, 0x0, {0x69, 0x8001, 0xa8, 0x0, 0x9, 0x6}, 0x1, 0xfffffffffffffffe}, 0x80, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) sendmsg$kcm(r2, &(0x7f0000001900)={&(0x7f0000001940)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(gcm(aes))\x00'}, 0xfffffffffffffc2f, 0x0}, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r0, &(0x7f00000000c0)=0x80, 0x12) r4 = gettid() perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x100000000, 0x401, 0x2, 0x777a, 0x0, 0x2, 0x40000, 0xc, 0xaf, 0x1, 0x9, 0x0, 0x5, 0xad, 0x8f, 0x7, 0x0, 0x3, 0x401, 0x8, 0x7fffffff, 0xd99b, 0x4, 0x4, 0x8001, 0x8, 0x9, 0x40, 0x7, 0x0, 0xfffffffffffffff8, 0x9, 0xff, 0xc4, 0x0, 0xd2b4, 0x0, 0x80e, 0x2, @perf_bp={0x0, 0x8}, 0x9000, 0x0, 0xffffffff, 0x0, 0x2, 0xd6}, r4, 0xe, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 09:13:44 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)) [ 1236.277738] protocol 88fb is buggy, dev hsr_slave_0 [ 1236.282956] protocol 88fb is buggy, dev hsr_slave_1 [ 1236.288224] protocol 88fb is buggy, dev hsr_slave_0 [ 1236.293331] protocol 88fb is buggy, dev hsr_slave_1 09:13:45 executing program 3: creat(0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) [ 1236.597770] protocol 88fb is buggy, dev hsr_slave_0 [ 1236.602982] protocol 88fb is buggy, dev hsr_slave_1 09:13:45 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f00000000c0)={0x2, 0x0, 0x3002, {0x0, 0x0, 0x300}}) 09:13:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000800000010000340140000000000000037153e370000000060000000d1bd", 0x2e}], 0x1}, 0x0) 09:13:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000004f0081747801000000f869d9ef5b0cd90c0008000000000000000020000000", 0x23}], 0x1}, 0x0) 09:13:45 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x2, &(0x7f0000000080)=0x11, 0x4) 09:13:46 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 09:13:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000800000010000340140000000000000037153e370000000060000000d1bd", 0x2e}], 0x1}, 0x0) [ 1238.050509] kauditd_printk_skb: 81 callbacks suppressed [ 1238.050525] audit: type=1400 audit(1555924426.581:7634): avc: denied { map } for pid=20969 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1b, &(0x7f0000000000)={0xfffffec2, 0x0}, 0x10) [ 1238.204320] audit: type=1400 audit(1555924426.621:7635): avc: denied { map } for pid=20969 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.368918] audit: type=1400 audit(1555924426.641:7636): avc: denied { map } for pid=20969 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:47 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x4000000006) bind$inet(r1, &(0x7f0000003280)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback}, 0x10) 09:13:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0xff4c) [ 1238.501450] audit: type=1400 audit(1555924426.661:7637): avc: denied { map } for pid=20969 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:47 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000140), 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x800448d5, 0x0) [ 1238.637290] audit: type=1400 audit(1555924426.721:7638): avc: denied { map } for pid=20969 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.757806] audit: type=1400 audit(1555924426.801:7639): avc: denied { map } for pid=20969 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.887282] audit: type=1400 audit(1555924426.821:7640): avc: denied { map } for pid=20969 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1239.018757] audit: type=1400 audit(1555924426.881:7641): avc: denied { map } for pid=20969 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2002002102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="93"], 0x1, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 1239.175654] audit: type=1400 audit(1555924426.901:7642): avc: denied { map } for pid=20969 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1239.299835] audit: type=1400 audit(1555924426.971:7643): avc: denied { map } for pid=20969 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:47 executing program 3: prctl$PR_GET_THP_DISABLE(0x2a) munlockall() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) 09:13:48 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpuacct.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) gettid() perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x2, 0x411f, 0x10000, 0x9, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x5f64, 0x7, 0x0, 0x0, 0x1, 0xafd, 0x8001, 0x3cd, 0x0, 0x0, 0x7f, 0x0, 0xd3, 0x5, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8a9, 0x0, 0x6, 0x7fff, 0x0, 0xaefff88, 0x0, @perf_bp={0x0}, 0x18020, 0x7, 0x0, 0x3, 0x7, 0x0, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={0xffffffffffffffff, 0x3, 0x0, 0xfffffffffffffcc7, 0x0}, 0x20) 09:13:48 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x4000000006) bind$inet(r1, &(0x7f0000003280)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback}, 0x10) 09:13:48 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x4000000006) bind$inet(r1, &(0x7f0000003280)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback}, 0x10) 09:13:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f00000000c0), 0x4000000000000d3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) [ 1240.757748] net_ratelimit: 22 callbacks suppressed [ 1240.757757] protocol 88fb is buggy, dev hsr_slave_0 [ 1240.767958] protocol 88fb is buggy, dev hsr_slave_1 09:13:49 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) [ 1240.997777] protocol 88fb is buggy, dev hsr_slave_0 [ 1241.003028] protocol 88fb is buggy, dev hsr_slave_1 09:13:49 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x4000000006) bind$inet(r1, &(0x7f0000003280)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback}, 0x10) 09:13:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1007a00, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) 09:13:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x1012, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fremovexattr(r0, &(0x7f0000000000)=@known='system.sockprotoname\x00') 09:13:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x4000000006) bind$inet(r1, &(0x7f0000003280)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback}, 0x10) 09:13:50 executing program 5: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000140)='\n', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x12\x00'}, &(0x7f0000000700)}) [ 1241.717740] protocol 88fb is buggy, dev hsr_slave_0 [ 1241.722971] protocol 88fb is buggy, dev hsr_slave_1 [ 1241.728325] protocol 88fb is buggy, dev hsr_slave_0 [ 1241.733524] protocol 88fb is buggy, dev hsr_slave_1 09:13:50 executing program 2: r0 = socket(0x22, 0x2, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) [ 1242.517737] protocol 88fb is buggy, dev hsr_slave_0 [ 1242.522877] protocol 88fb is buggy, dev hsr_slave_1 09:13:51 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x4000000006) bind$inet(r1, &(0x7f0000003280)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback}, 0x10) 09:13:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x2, 0x800000ec2, 0x4000000000002}, 0x15f) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x29) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x1}, 0x2c) 09:13:51 executing program 2: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) sendmmsg(r0, &(0x7f0000001540), 0x24c, 0x0) 09:13:51 executing program 3: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x3) 09:13:51 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x4000000006) bind$inet(r1, &(0x7f0000003280)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback}, 0x10) 09:13:51 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000000340)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000240)=0x6d44, 0x4) sendto$packet(r1, &(0x7f0000000140)='8', 0x1, 0x0, 0x0, 0x0) [ 1243.354339] kauditd_printk_skb: 99 callbacks suppressed [ 1243.354355] audit: type=1400 audit(1555924431.881:7743): avc: denied { map } for pid=22592 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.550518] audit: type=1400 audit(1555924431.881:7744): avc: denied { map } for pid=22592 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.659181] audit: type=1400 audit(1555924431.921:7745): avc: denied { map } for pid=22592 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.798111] audit: type=1400 audit(1555924431.921:7746): avc: denied { map } for pid=22592 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.907808] audit: type=1400 audit(1555924432.001:7747): avc: denied { map } for pid=22592 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1244.059561] audit: type=1400 audit(1555924432.021:7748): avc: denied { map_create } for pid=22594 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 09:13:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) write(r0, &(0x7f0000000080)='!', 0x1) [ 1244.182980] audit: type=1400 audit(1555924432.021:7749): avc: denied { map_read map_write } for pid=22594 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 09:13:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f0000000080)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000009000)=r1, 0x4) [ 1244.337771] audit: type=1400 audit(1555924432.071:7750): avc: denied { map } for pid=22592 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_getnetconf={0x14, 0x52, 0xc5155cade958e8f3}, 0x14}}, 0x0) [ 1244.511295] audit: type=1400 audit(1555924432.071:7751): avc: denied { map } for pid=22592 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1244.714105] audit: type=1400 audit(1555924432.141:7752): avc: denied { map } for pid=22592 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000001c0)=0xc9, 0x4) listen(r0, 0xfc0004) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r1, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x2, &(0x7f0000004a80)={0x77359400}) 09:13:53 executing program 2: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x40000104001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capset(&(0x7f0000000000)={0x8020080522}, &(0x7f0000000040)) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000001, 0x9b, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 09:13:53 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000100007031dfffd946fa2830020200a0009000100000000010000aba20400ff7e", 0x24}], 0x1}, 0x0) 09:13:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, 0x0) [ 1245.877782] net_ratelimit: 18 callbacks suppressed [ 1245.877792] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.888110] protocol 88fb is buggy, dev hsr_slave_1 [ 1245.893385] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.898651] protocol 88fb is buggy, dev hsr_slave_1 09:13:54 executing program 3: syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x80) [ 1245.997601] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 09:13:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="287474dae66c00000000000000544340", 0x10) r1 = accept(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001980)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="1c458765f391bf93f0248dbb5dc156505fe7971b2cd088da4f5960512e7f4bc51ee546cf84007100ded65ae7c7b75cb1c14d6efaecc23336c7ccef9b401ba07dd38a357f1f6421bf71b01420d938f37719d0351a7c03acabe4ae85acc3084511e4e1f477", 0x64}], 0x1}], 0x1, 0x0) 09:13:54 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x0, @rand_addr=0x23d}], 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x9}, 0x1c) 09:13:54 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000100007031dfffd946fa2830020200a0009000100000000010000aba20400ff7e", 0x24}], 0x1}, 0x0) [ 1246.677763] protocol 88fb is buggy, dev hsr_slave_0 [ 1246.682950] protocol 88fb is buggy, dev hsr_slave_1 [ 1246.688187] protocol 88fb is buggy, dev hsr_slave_0 [ 1246.693296] protocol 88fb is buggy, dev hsr_slave_1 09:13:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x200000000004e23}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf011, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 09:13:55 executing program 3: syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x80) [ 1246.981565] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 1246.997759] protocol 88fb is buggy, dev hsr_slave_0 [ 1247.002941] protocol 88fb is buggy, dev hsr_slave_1 09:13:55 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000100007031dfffd946fa2830020200a0009000100000000010000aba20400ff7e", 0x24}], 0x1}, 0x0) 09:13:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000440)="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", 0x201, 0x400}], 0x0, 0x0) 09:13:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000140), 0xffffff35) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 09:13:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init() dup3(r0, r1, 0x0) 09:13:56 executing program 3: syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x80) [ 1248.222099] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 1248.390308] kauditd_printk_skb: 136 callbacks suppressed [ 1248.390323] audit: type=1400 audit(1555924436.921:7889): avc: denied { map } for pid=23547 comm="grep" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:57 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000100007031dfffd946fa2830020200a0009000100000000010000aba20400ff7e", 0x24}], 0x1}, 0x0) [ 1248.623748] audit: type=1400 audit(1555924437.151:7890): avc: denied { map } for pid=23596 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1248.741448] audit: type=1400 audit(1555924437.181:7891): avc: denied { map } for pid=23596 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1248.911195] audit: type=1400 audit(1555924437.201:7892): avc: denied { map } for pid=23596 comm="ps" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1249.075411] audit: type=1400 audit(1555924437.231:7893): avc: denied { map } for pid=23596 comm="ps" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f0000000000)={'team0\x00\n\x00L\xff\xff\xff\xc3`\x00'}) [ 1249.235711] audit: type=1400 audit(1555924437.231:7894): avc: denied { map } for pid=23602 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:57 executing program 3: syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x80) [ 1249.400632] audit: type=1400 audit(1555924437.271:7895): avc: denied { map } for pid=23602 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1249.553399] audit: type=1400 audit(1555924437.301:7896): avc: denied { map } for pid=23599 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1249.662325] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 1249.707691] audit: type=1400 audit(1555924437.311:7897): avc: denied { map } for pid=23596 comm="ps" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc0046209, 0x0) [ 1249.868580] audit: type=1400 audit(1555924437.321:7898): avc: denied { map } for pid=23602 comm="grep" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:13:58 executing program 5: r0 = socket$inet6(0xa, 0x40000000000005, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x1}], 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x7}, 0x1c) 09:13:58 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'teql0\x00'}) 09:13:59 executing program 3: socketpair(0x18, 0x0, 0x1, &(0x7f0000000340)) 09:13:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) [ 1251.003099] net_ratelimit: 22 callbacks suppressed [ 1251.003128] Dead loop on virtual device ip6_vti0, fix it urgently! [ 1251.157790] protocol 88fb is buggy, dev hsr_slave_0 [ 1251.163011] protocol 88fb is buggy, dev hsr_slave_1 [ 1251.397965] protocol 88fb is buggy, dev hsr_slave_0 [ 1251.403270] protocol 88fb is buggy, dev hsr_slave_1 09:14:00 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 09:14:00 executing program 2: prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 09:14:00 executing program 3: eventfd(0x4) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r2, &(0x7f0000000080), 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 09:14:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 1252.117724] protocol 88fb is buggy, dev hsr_slave_0 [ 1252.123039] protocol 88fb is buggy, dev hsr_slave_1 [ 1252.128390] protocol 88fb is buggy, dev hsr_slave_0 [ 1252.133590] protocol 88fb is buggy, dev hsr_slave_1 09:14:01 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r1, &(0x7f00000026c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xfffffeec, 0x0}}], 0x400000000000031, 0x0) write$binfmt_script(r1, 0x0, 0x0) dup2(r1, r0) [ 1252.917809] protocol 88fb is buggy, dev hsr_slave_0 09:14:01 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000400)=""/68, &(0x7f0000000540)=0x44) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f00000001c0)={0x1f, 0x0, 0xfffffffffffffffb, 0x3}) setxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000640)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x147, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) epoll_create(0x78c) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, &(0x7f0000000480)={0x0, @frame_sync}) ioctl$SG_GET_SCSI_ID(r0, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r0, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:14:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000140)={0x0, {{0x2, 0x0, @multicast1}}, 0x0, 0x1, [{{0xa, 0x0, @broadcast}}]}, 0x110) 09:14:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000380)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd000000100001000c081000418e00000004fcff", 0x58}], 0x1) 09:14:02 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1253.593464] kauditd_printk_skb: 98 callbacks suppressed [ 1253.593479] audit: type=1400 audit(1555924442.121:7997): avc: denied { map } for pid=24771 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1253.761866] audit: type=1400 audit(1555924442.171:7998): avc: denied { map } for pid=24771 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1253.937752] audit: type=1400 audit(1555924442.171:7999): avc: denied { map } for pid=24771 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:02 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000)=0x1, 0x2c2) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) [ 1254.131139] audit: type=1400 audit(1555924442.171:8000): avc: denied { map } for pid=24771 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000003c0)="0adc1f123c123f319bd070") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x401}, 0x1c) [ 1254.305195] audit: type=1400 audit(1555924442.291:8001): avc: denied { map } for pid=24771 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:02 executing program 2: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) [ 1254.471642] audit: type=1400 audit(1555924442.391:8002): avc: denied { map } for pid=24771 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1254.664003] audit: type=1400 audit(1555924442.391:8003): avc: denied { map } for pid=24771 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') exit(0x0) write$P9_RFSYNC(r0, 0x0, 0x0) [ 1254.841214] audit: type=1400 audit(1555924442.461:8004): avc: denied { map } for pid=24771 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1255.059443] audit: type=1400 audit(1555924442.501:8005): avc: denied { map } for pid=24771 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1255.225357] audit: type=1400 audit(1555924442.591:8006): avc: denied { map } for pid=24771 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:03 executing program 0: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, 0x0}}, {{&(0x7f00000035c0)=@in={0x2, 0x4e20}, 0x80, 0x0}}], 0x2, 0x0) 09:14:04 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 09:14:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000002ec0)=0x6) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") ioctl$TCSETSF(r1, 0x5437, 0x0) 09:14:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723db4d8b1932e2f66696c65302c6c6f7765726469723d2e3a66696c65302c776f726b6469723d2e2131b3"]) 09:14:04 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TIOCSTI(r0, 0x40186f40, 0x7400dd) [ 1256.277739] net_ratelimit: 19 callbacks suppressed [ 1256.277748] protocol 88fb is buggy, dev hsr_slave_0 [ 1256.288091] protocol 88fb is buggy, dev hsr_slave_1 [ 1256.293376] protocol 88fb is buggy, dev hsr_slave_0 [ 1256.298652] protocol 88fb is buggy, dev hsr_slave_1 09:14:05 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}, 0x0, 0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x1}, {0x20000000000080}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 09:14:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\n\x00L\xff\xff\xff\xc3`\x00'}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000180)="da4a66c443f9627cbe120e2e6566460f16770d460f30470f18737e66baf80cb8b6fc6b8eef66bafc0c66b8003066ef0f20e035000040000f22e0f20f011fc4617c28db470f2335", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 1257.077740] protocol 88fb is buggy, dev hsr_slave_0 [ 1257.082962] protocol 88fb is buggy, dev hsr_slave_1 [ 1257.088194] protocol 88fb is buggy, dev hsr_slave_0 [ 1257.093300] protocol 88fb is buggy, dev hsr_slave_1 09:14:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000140)=0x1) read(r1, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f000001cfb0)={0x0, 0x8, 0x0, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) 09:14:05 executing program 0: open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) getpgid(0x0) r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) [ 1257.353767] overlayfs: failed to resolve '´Ø±“./file0': -2 [ 1257.398367] protocol 88fb is buggy, dev hsr_slave_0 [ 1257.403513] protocol 88fb is buggy, dev hsr_slave_1 09:14:06 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) 09:14:06 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x2, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) [ 1258.301713] binder: 25903:25988 transaction failed 29189/-22, size 24-8 line 2855 09:14:07 executing program 4: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000200)={'syz'}, &(0x7f00000003c0)="add8498f4aa2fe4761b7706106ecf906a1980de590b8e401a7bc0c540e4bbc63323e2436c0ecb81837facc5e505675664a0e0f85e8da6dfe53abaff5bf0ee68e7a06d90f18c8fe16482675c58962114562af77acbb9d81f1e090063828f8958cc9e91cda15d1", 0x66, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f0000000500)="6cdbe7472c66c01ce9073a6881ded553df5a65560869185d62aa0d01774c9bc2e64589ca2758a12dcfbd42cb1870d2908352417cc0b8d2e11b4c8dd114e07ca73d591b345d44e573b8e2b2f5f6952e47e4300799879705be9d9b1ce57ee02c4617036071652a930f2e4954ba9f2dac7820bfad895fceef38a27bd2272d07be693f0b7d7e599932288f618ccab9cb14fd63c961592cec23d799a18b5c86fffce14d4d394d62c92d66debb248f54c23984117cec165eabf5d524cd42103b1c8a3acd0a6dc0e1d20c7aa11feeec96", 0xcd, 0xfffffffffffffff8) r3 = add_key$user(&(0x7f0000000600)='user\x00', 0x0, &(0x7f0000000680)="7e346365309f211afade490af10725742961df5053cc267f9567628b450806567b8d137f78ce4eb2d0a87c0f6c34b8f84d8433", 0x33, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000700)={r1, r2, r3}, &(0x7f0000000740)=""/131, 0x83, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r5 = dup2(r4, r4) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB], 0x1}}, 0x44801) ioctl$LOOP_CLR_FD(r5, 0x4c01) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f00000004c0), 0x4) flistxattr(r0, &(0x7f0000000800)=""/121, 0x79) epoll_create1(0x0) 09:14:07 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000040)) 09:14:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x8, 0x10000, 0x3, 0x9, 0x0, 0x3, 0x4000, 0x8, 0x2, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0x0, 0x5, 0x4, 0x5, 0x3, 0x2, 0x3, 0x4, 0x1f, 0xff, 0xfff, 0x2, 0x7, 0xfffffffffffffff8, 0x80000001, 0x7, 0x4, 0x4, 0x240b23dd, 0x0, 0x7296e59, 0xdd, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3}, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, r0, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000002c0)={0x7, 0x70, 0x800, 0x8000, 0x0, 0x25, 0x0, 0x10100, 0x2, 0x5, 0x5, 0x1, 0x100000000, 0x80, 0x9, 0x2f, 0xfe2, 0x0, 0x0, 0x0, 0xeb, 0x4, 0x3, 0xfffffffffffffffe, 0xc5, 0x3ff, 0x6, 0x5, 0x9, 0x7, 0x400, 0x0, 0x0, 0x7, 0xf2, 0x1, 0x5, 0x6, 0x0, 0x5d, 0x5, @perf_config_ext={0x100000001, 0x8}, 0x1010, 0x3, 0x3, 0x7, 0x3, 0x82fb, 0x40}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x4000) [ 1258.995106] kauditd_printk_skb: 67 callbacks suppressed [ 1258.995121] audit: type=1400 audit(1555924447.521:8074): avc: denied { map } for pid=26227 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1259.177725] audit: type=1400 audit(1555924447.561:8075): avc: denied { map } for pid=26227 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:07 executing program 0: mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) read(r0, &(0x7f0000000200)=""/4096, 0xff21) [ 1259.327774] audit: type=1400 audit(1555924447.611:8076): avc: denied { map } for pid=26227 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1259.529235] audit: type=1400 audit(1555924447.611:8077): avc: denied { map } for pid=26227 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1259.668946] audit: type=1400 audit(1555924447.661:8078): avc: denied { map } for pid=26227 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1259.854677] audit: type=1400 audit(1555924447.751:8079): avc: denied { map } for pid=26227 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:08 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f00000001c0)=0xdf8, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) [ 1260.017034] audit: type=1400 audit(1555924447.751:8080): avc: denied { map } for pid=26227 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:08 executing program 3: creat(&(0x7f0000000400)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getegid() sendto$rose(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x4000, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='1.7.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='::,.:nullb:\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) clock_getres(0x2, &(0x7f0000000200)) [ 1260.215540] audit: type=1400 audit(1555924447.821:8081): avc: denied { map } for pid=26227 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1260.377741] audit: type=1400 audit(1555924447.821:8082): avc: denied { map } for pid=26227 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:09 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x100000000000001f, 0x804, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) unshare(0x8000400) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000000c0)}, 0x10b) 09:14:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x11) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VT_ACTIVATE(r0, 0x8910, 0x715000) [ 1260.552076] audit: type=1400 audit(1555924447.911:8083): avc: denied { map } for pid=26292 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e1f, 0x101, @loopback, 0x281}, {0xa, 0x4e23, 0x418a, @mcast1, 0x7}, 0x7, [0x1, 0x7d, 0xbc6, 0x4, 0x9, 0x1, 0x4, 0xfffff80000000002]}, 0xfd16) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local, 0x5}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2, 0x7]}, 0x5c) 09:14:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='environ\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 1261.557749] net_ratelimit: 22 callbacks suppressed [ 1261.557759] protocol 88fb is buggy, dev hsr_slave_0 [ 1261.567975] protocol 88fb is buggy, dev hsr_slave_1 [ 1261.799258] protocol 88fb is buggy, dev hsr_slave_0 [ 1261.805351] protocol 88fb is buggy, dev hsr_slave_1 09:14:10 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000040)={0x0, 0xe538, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}}}) 09:14:10 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000040)=0x7f, 0x4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xc8, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, 0x5c) 09:14:10 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x16, r0, r1) [ 1262.517738] protocol 88fb is buggy, dev hsr_slave_0 [ 1262.523071] protocol 88fb is buggy, dev hsr_slave_1 [ 1262.528436] protocol 88fb is buggy, dev hsr_slave_0 [ 1262.533900] protocol 88fb is buggy, dev hsr_slave_1 09:14:11 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) 09:14:11 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x3da, 0x500) 09:14:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0006000000000308000200000000c27ed0ff00000000006a644cd90180b4b8177e22de1730a2adc0ae2e"}, 0x4c) 09:14:11 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000000c0), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000080)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x1000003, 0x0) [ 1263.317774] protocol 88fb is buggy, dev hsr_slave_0 [ 1263.322938] protocol 88fb is buggy, dev hsr_slave_1 09:14:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000380)=[0x0]) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0xe0b504b9e08c1204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0xc32e, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x9, 0x3, 0x268, 0x0, 0x0, 0x148, 0x0, 0x0, 0x248, 0x248, 0x248, 0x248, 0x248, 0x3, &(0x7f0000000200), {[{{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x7f, [0x1, 0x8001, 0x9e, 0x100000000, 0x0, 0x3], 0x2, 0x21}, {0x0, [0x2c32, 0x10000, 0xffffffff, 0x1, 0xffffffffffffff2c, 0x1], 0x3ff}}}}, {{@ip={@remote, @multicast1, 0x0, 0x0, 'vcan0\x00', 'veth1\x00', {}, {0xff}, 0x6c, 0x3, 0xe}, 0x0, 0x98, 0xd8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x7, 0x2, 0x0, 0x0, 0x0, 0x80000000, 0x5, 0x20c]}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c8) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1264.000131] kauditd_printk_skb: 87 callbacks suppressed [ 1264.000147] audit: type=1400 audit(1555924452.521:8171): avc: denied { map } for pid=27579 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1264.169728] audit: type=1400 audit(1555924452.581:8172): avc: denied { map } for pid=27579 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000dc0)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 09:14:12 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x16, r0, r1) [ 1264.310594] SELinux: failed to load policy [ 1264.340052] audit: type=1400 audit(1555924452.671:8173): avc: denied { map } for pid=27579 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1264.529164] audit: type=1400 audit(1555924452.681:8174): avc: denied { map } for pid=27579 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0x80089203, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = shmget$private(0x0, 0x13000, 0x78000000, &(0x7f0000feb000/0x13000)=nil) r1 = shmat(r0, &(0x7f0000ff3000/0x3000)=nil, 0x5ffd) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20008800}, 0x0) shmdt(r1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x703d}}}, 0xb8}}, 0x0) [ 1265.047834] audit: type=1400 audit(1555924453.571:8175): avc: denied { map } for pid=28047 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:13 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x54a9}, 0x9) [ 1265.142117] audit: type=1400 audit(1555924453.581:8177): avc: denied { map } for pid=28047 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0006000000000308000200000000c27ed0ff00000000006a644cd90180b4b8177e22de1730a2adc0ae2e"}, 0x4c) [ 1265.300745] input: syz1 as /devices/virtual/input/input70 [ 1265.322521] audit: type=1400 audit(1555924453.581:8176): avc: denied { map } for pid=28062 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1265.522865] audit: type=1400 audit(1555924453.611:8178): avc: denied { map } for pid=28062 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x16, r0, r1) [ 1265.725073] audit: type=1400 audit(1555924453.621:8179): avc: denied { map } for pid=28047 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1265.908080] audit: type=1400 audit(1555924453.621:8180): avc: denied { map } for pid=28047 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 09:14:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000036fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000021000)=@ipv4_newroute={0x1c, 0x18, 0x21, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x1c}}, 0x0) 09:14:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x807e, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000100)='selinuxbdevselinuxeth0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x8, @ipv4={[], [], @local}}, {0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1f}, 0x3f}, 0xffffffffffffffff, 0x3}}, 0x48) syz_open_procfs(0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, 0x0, 0x101801, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$tun(r2, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x1) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0x3e6, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000080)=0x10001, 0x4) close(r3) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) [ 1266.532627] SELinux: failed to load policy 09:14:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0006000000000308000200000000c27ed0ff00000000006a644cd90180b4b8177e22de1730a2adc0ae2e"}, 0x4c) [ 1266.677734] net_ratelimit: 18 callbacks suppressed [ 1266.677742] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.688085] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.693384] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.698611] protocol 88fb is buggy, dev hsr_slave_1 09:14:15 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) lstat(0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfc"]) chdir(&(0x7f0000000380)='./file0\x00') write$P9_RLERROR(r0, &(0x7f0000000100)=ANY=[], 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') getpeername$ax25(r0, 0x0, &(0x7f0000000180)) acct(&(0x7f00000000c0)='./file1\x00') mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x40, 0x10001) lgetxattr(&(0x7f0000000080)='./file1/file1\x00', 0x0, 0x0, 0x0) 09:14:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x16, r0, r1) 09:14:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000480)={{}, {0x20000000304, @link_local}, 0x0, {0x2, 0x0, @empty}, 'lapb0\x00'}) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @empty}, {0x0, @remote}, 0x0, {0x2, 0x0, @broadcast}, 'gretap0\x00'}) 09:14:15 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fcntl$setstatus(r0, 0x4, 0x800) accept(r0, 0x0, 0x0) [ 1267.477741] protocol 88fb is buggy, dev hsr_slave_0 [ 1267.482908] protocol 88fb is buggy, dev hsr_slave_1 [ 1267.488137] protocol 88fb is buggy, dev hsr_slave_0 [ 1267.493263] protocol 88fb is buggy, dev hsr_slave_1 [ 1267.797755] protocol 88fb is buggy, dev hsr_slave_0 [ 1267.802957] protocol 88fb is buggy, dev hsr_slave_1 [ 1268.040384] SELinux: failed to load policy 09:14:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0006000000000308000200000000c27ed0ff00000000006a644cd90180b4b8177e22de1730a2adc0ae2e"}, 0x4c) 09:14:17 executing program 5: move_pages(0x0, 0x4, &(0x7f0000000280)=[&(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0xf000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000007000/0x3000)=nil], &(0x7f00000002c0)=[0x0, 0x1], &(0x7f0000000300), 0x0) 09:14:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000001600)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) r2 = socket(0x2, 0x1, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000080)={'lo\x00'}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0xfffffffffffffd34) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={'lo\x00', 0x6a}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x900) 09:14:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1454.625922] kworker/u4:2 D25432 34 2 0x80000000 [ 1454.645554] Workqueue: events_unbound fsnotify_connector_destroy_workfn [ 1454.653034] Call Trace: [ 1454.655806] __schedule+0x813/0x1d00 [ 1454.689694] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1454.707762] ? mark_held_locks+0x100/0x100 [ 1454.712166] schedule+0x92/0x1c0 [ 1454.715657] schedule_timeout+0x8ca/0xfd0 [ 1454.727181] ? wait_for_completion+0x294/0x440 [ 1454.732531] ? find_held_lock+0x35/0x130 [ 1454.736739] ? usleep_range+0x170/0x170 [ 1454.747964] ? mark_held_locks+0xb1/0x100 [ 1454.752313] ? _raw_spin_unlock_irq+0x28/0x90 [ 1454.756925] ? wait_for_completion+0x294/0x440 [ 1454.770752] ? _raw_spin_unlock_irq+0x28/0x90 [ 1454.775430] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1454.784439] ? trace_hardirqs_on+0x67/0x230 [ 1454.793071] ? kasan_check_read+0x11/0x20 [ 1454.797411] wait_for_completion+0x29c/0x440 [ 1454.806392] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 1454.816597] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1454.826187] ? wake_up_q+0x100/0x100 [ 1454.834375] ? __lockdep_init_map+0x10c/0x5b0 [ 1454.844508] __synchronize_srcu+0x12e/0x210 [ 1454.859902] ? call_srcu+0x10/0x10 [ 1454.863597] ? rcu_unexpedite_gp+0x20/0x20 [ 1454.875024] ? kvm_clock_read+0x18/0x30 [ 1454.882100] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1454.887298] ? ktime_get_mono_fast_ns+0x178/0x200 [ 1454.899096] synchronize_srcu+0x239/0x3e8 [ 1454.903420] fsnotify_connector_destroy_workfn+0x4e/0xa0 [ 1454.916068] process_one_work+0x98e/0x1760 [ 1454.924769] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1454.936330] ? lock_acquire+0x16f/0x3f0 [ 1454.942106] ? kasan_check_write+0x14/0x20 [ 1454.946465] ? do_raw_spin_lock+0xc8/0x240 [ 1454.957525] worker_thread+0x98/0xe40 [ 1454.963244] ? trace_hardirqs_on+0x67/0x230 [ 1454.974559] kthread+0x357/0x430 [ 1454.979803] ? process_one_work+0x1760/0x1760 [ 1454.984438] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 1454.997051] ret_from_fork+0x3a/0x50 [ 1455.002770] INFO: task kworker/u4:3:124 blocked for more than 140 seconds. [ 1455.017240] Not tainted 4.19.36 #4 [ 1455.023329] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1455.039461] kworker/u4:3 D25568 124 2 0x80000000 [ 1455.045293] Workqueue: events_unbound fsnotify_mark_destroy_workfn [ 1455.057759] Call Trace: [ 1455.060411] __schedule+0x813/0x1d00 [ 1455.064163] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1455.069750] ? mark_held_locks+0x100/0x100 [ 1455.074121] schedule+0x92/0x1c0 [ 1455.077604] schedule_timeout+0x8ca/0xfd0 [ 1455.090160] ? wait_for_completion+0x294/0x440 [ 1455.094895] ? find_held_lock+0x35/0x130 [ 1455.107505] ? usleep_range+0x170/0x170 [ 1455.112035] ? mark_held_locks+0xb1/0x100 [ 1455.116319] ? _raw_spin_unlock_irq+0x28/0x90 [ 1455.129343] ? wait_for_completion+0x294/0x440 [ 1455.134077] ? _raw_spin_unlock_irq+0x28/0x90 [ 1455.145492] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1455.151959] ? trace_hardirqs_on+0x67/0x230 [ 1455.157563] ? kasan_check_read+0x11/0x20 [ 1455.169804] wait_for_completion+0x29c/0x440 [ 1455.174391] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 1455.186919] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1455.195218] ? wake_up_q+0x100/0x100 [ 1455.204642] ? __lockdep_init_map+0x10c/0x5b0 [ 1455.212200] __synchronize_srcu+0x12e/0x210 [ 1455.216670] ? call_srcu+0x10/0x10 [ 1455.225729] ? rcu_unexpedite_gp+0x20/0x20 [ 1455.233100] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1455.245287] synchronize_srcu+0x2dc/0x3e8 [ 1455.252446] fsnotify_mark_destroy_workfn+0x110/0x3b0 [ 1455.263452] ? __lock_is_held+0xb6/0x140 [ 1455.270695] ? fsnotify_grab_connector+0x210/0x210 [ 1455.275797] process_one_work+0x98e/0x1760 [ 1455.285815] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1455.293675] ? lock_acquire+0x16f/0x3f0 [ 1455.303395] ? kasan_check_write+0x14/0x20 [ 1455.311795] ? do_raw_spin_lock+0xc8/0x240 [ 1455.316196] worker_thread+0x98/0xe40 [ 1455.326896] kthread+0x357/0x430 [ 1455.333447] ? process_one_work+0x1760/0x1760 [ 1455.343976] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 1455.352667] ret_from_fork+0x3a/0x50 [ 1455.356719] INFO: task syz-executor.5:4049 blocked for more than 140 seconds. [ 1455.369662] Not tainted 4.19.36 #4 [ 1455.373845] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1455.387451] syz-executor.5 D27392 4049 8038 0x00000004 [ 1455.396428] Call Trace: [ 1455.405066] __schedule+0x813/0x1d00 [ 1455.411867] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1455.417036] ? mark_held_locks+0x100/0x100 [ 1455.426822] schedule+0x92/0x1c0 [ 1455.433279] schedule_timeout+0x8ca/0xfd0 [ 1455.437576] ? wait_for_completion+0x294/0x440 [ 1455.449389] ? find_held_lock+0x35/0x130 [ 1455.453599] ? usleep_range+0x170/0x170 [ 1455.464537] ? mark_held_locks+0xb1/0x100 [ 1455.470580] ? _raw_spin_unlock_irq+0x28/0x90 [ 1455.475205] ? wait_for_completion+0x294/0x440 [ 1455.487951] ? _raw_spin_unlock_irq+0x28/0x90 [ 1455.492619] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1455.497332] ? trace_hardirqs_on+0x67/0x230 [ 1455.508572] ? kasan_check_read+0x11/0x20 [ 1455.512878] wait_for_completion+0x29c/0x440 [ 1455.517526] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 1455.530672] ? wake_up_q+0x100/0x100 [ 1455.534668] ? flush_workqueue_prep_pwqs+0x352/0x590 [ 1455.545471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1455.554308] flush_workqueue+0x40f/0x14c0 [ 1455.567918] ? pwq_unbound_release_workfn+0x2e0/0x2e0 [ 1455.573500] ? wait_for_completion+0x440/0x440 [ 1455.587435] ceph_msgr_flush+0x15/0x20 [ 1455.592022] ? ceph_msgr_flush+0x15/0x20 [ 1455.596329] ceph_mdsc_pre_umount+0x389/0x430 [ 1455.608034] ceph_kill_sb+0x8e/0x1e0 [ 1455.611917] deactivate_locked_super+0x9a/0x100 [ 1455.616716] ceph_mount+0x1302/0x1840 [ 1455.628471] mount_fs+0xae/0x331 [ 1455.631977] vfs_kern_mount.part.0+0x6f/0x410 [ 1455.636604] do_mount+0x53e/0x2bc0 [ 1455.646908] ? copy_mount_string+0x40/0x40 [ 1455.653009] ? _copy_from_user+0xdd/0x150 [ 1455.657313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1455.670064] ? copy_mount_options+0x280/0x3a0 [ 1455.674743] ksys_mount+0xdb/0x150 [ 1455.683813] __x64_sys_mount+0xbe/0x150 [ 1455.690966] do_syscall_64+0x103/0x610 [ 1455.695019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1455.706088] RIP: 0033:0x458c29 [ 1455.713526] Code: Bad RIP value. [ 1455.717010] RSP: 002b:00007f17a6c2dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1455.730454] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458c29 [ 1455.742249] RDX: 0000000020000140 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1455.754009] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1455.765777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f17a6c2e6d4 [ 1455.777544] R13: 00000000004c4c0e R14: 00000000004d8888 R15: 00000000ffffffff [ 1455.789403] INFO: task syz-executor.2:4521 blocked for more than 140 seconds. [ 1455.796860] Not tainted 4.19.36 #4 [ 1455.806510] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1455.822776] syz-executor.2 D28216 4521 8029 0x00000004 [ 1455.831618] Call Trace: [ 1455.834325] __schedule+0x813/0x1d00 [ 1455.844816] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1455.852990] ? mark_held_locks+0x100/0x100 [ 1455.857412] schedule+0x92/0x1c0 [ 1455.866389] schedule_timeout+0x8ca/0xfd0 [ 1455.873742] ? wait_for_completion+0x294/0x440 [ 1455.885133] ? find_held_lock+0x35/0x130 [ 1455.892331] ? usleep_range+0x170/0x170 [ 1455.896486] ? mark_held_locks+0xb1/0x100 [ 1455.906314] ? _raw_spin_unlock_irq+0x28/0x90 [ 1455.913983] ? wait_for_completion+0x294/0x440 [ 1455.924086] ? _raw_spin_unlock_irq+0x28/0x90 [ 1455.931679] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1455.936606] ? trace_hardirqs_on+0x67/0x230 [ 1455.946484] ? kasan_check_read+0x11/0x20 [ 1455.953691] wait_for_completion+0x29c/0x440 [ 1455.965630] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 1455.975888] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1455.986895] ? wake_up_q+0x100/0x100 [ 1455.993781] ? __lockdep_init_map+0x10c/0x5b0 [ 1456.004001] __synchronize_srcu+0x12e/0x210 [ 1456.011517] ? call_srcu+0x10/0x10 [ 1456.015197] ? rcu_unexpedite_gp+0x20/0x20 [ 1456.025015] ? kvm_clock_read+0x18/0x30 [ 1456.032070] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1456.037261] ? ktime_get_mono_fast_ns+0x178/0x200 [ 1456.048100] synchronize_srcu+0x239/0x3e8 [ 1456.052524] perf_trace_event_unreg.isra.0+0xcb/0x220 [ 1456.065882] perf_trace_destroy+0xc1/0x100 [ 1456.070833] tp_perf_event_destroy+0x16/0x20 [ 1456.075397] ? perf_tp_event_init+0x120/0x120 [ 1456.087951] _free_event+0x356/0x1220 [ 1456.091924] ? ring_buffer_attach+0x650/0x650 [ 1456.096560] put_event+0x47/0x60 [ 1456.108528] perf_event_release_kernel+0x68f/0xbf0 [ 1456.113636] ? put_event+0x60/0x60 [ 1456.117398] ? ___might_sleep+0x163/0x280 [ 1456.128757] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1456.134484] ? perf_event_release_kernel+0xbf0/0xbf0 [ 1456.146580] perf_release+0x37/0x50 [ 1456.152066] __fput+0x2df/0x8b0 [ 1456.155500] ____fput+0x16/0x20 [ 1456.165726] task_work_run+0x14a/0x1c0 [ 1456.171715] exit_to_usermode_loop+0x273/0x2c0 [ 1456.176801] do_syscall_64+0x52d/0x610 [ 1456.187808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1456.193181] RIP: 0033:0x4129e1 [ 1456.196494] Code: bb c8 00 00 00 ff 15 1e 6e 24 00 85 c0 89 c5 0f 85 7e fc ff ff e9 32 ff ff ff 66 66 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 48 <89> 5c 24 d0 4c 89 6c 24 e8 48 89 d3 48 89 6c 24 d8 4c 89 64 24 e0 [ 1456.225608] RSP: 002b:00007ffd14ef73e0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1456.235247] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004129e1 [ 1456.250950] RDX: 0000001b31720000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1456.262712] RBP: 000000000073c900 R08: 000000000981a610 R09: 000000000981a614 [ 1456.274606] R10: 00007ffd14ef74b0 R11: 0000000000000293 R12: 0000000000000001 [ 1456.286483] R13: 000000000073c900 R14: 000000000013e48c R15: 000000000073bf0c [ 1456.298310] [ 1456.298310] Showing all locks held in the system: [ 1456.304795] 3 locks held by kworker/1:1/24: [ 1456.316181] 2 locks held by kworker/u4:2/34: [ 1456.322495] #0: 00000000328ab1b7 ((wq_completion)"events_unbound"){+.+.}, at: process_one_work+0x87e/0x1760 [ 1456.341479] #1: 00000000afe8a0d9 (connector_reaper_work){+.+.}, at: process_one_work+0x8b4/0x1760 [ 1456.355157] 2 locks held by kworker/u4:3/124: [ 1456.366453] #0: 00000000328ab1b7 ((wq_completion)"events_unbound"){+.+.}, at: process_one_work+0x87e/0x1760 [ 1456.381170] #1: 000000001f7ab05a ((reaper_work).work){+.+.}, at: process_one_work+0x8b4/0x1760 [ 1456.394657] 1 lock held by khungtaskd/1031: [ 1456.403459] #0: 000000006215a7d8 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 1456.416659] 1 lock held by rsyslogd/7861: [ 1456.425075] #0: 00000000a5984de6 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 1456.438925] 2 locks held by getty/7983: [ 1456.443017] #0: 00000000d2622dc7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1456.459971] #1: 000000006eefaf1b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1456.475904] 2 locks held by getty/7984: [ 1456.481697] #0: 0000000091eb74ac (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1456.498086] #1: 00000000faad76d6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1456.507318] 2 locks held by getty/7985: [ 1456.519577] #0: 000000001fe53dc0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1456.534605] #1: 00000000af3c258c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1456.546670] 2 locks held by getty/7986: [ 1456.556816] #0: 00000000cebf2ace (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1456.568864] #1: 0000000023128b49 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1456.584748] 2 locks held by getty/7987: [ 1456.590660] #0: 0000000002fa9839 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1456.606910] #1: 000000007c524762 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1456.624044] 2 locks held by getty/7988: [ 1456.631007] #0: 0000000090887c69 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1456.646643] #1: 00000000a7caa594 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1456.657744] 2 locks held by getty/7989: [ 1456.661822] #0: 00000000e56e9ab6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1456.678087] #1: 00000000846ab277 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1456.687440] 1 lock held by syz-executor.5/19092: [ 1456.701742] #0: 000000009f594b71 (event_mutex){+.+.}, at: perf_trace_destroy+0x28/0x100 [ 1456.713416] 1 lock held by syz-executor.2/27272: [ 1456.723673] #0: 000000009f594b71 (event_mutex){+.+.}, at: perf_trace_destroy+0x28/0x100 [ 1456.735253] 1 lock held by syz-executor.5/4049: [ 1456.745577] #0: 0000000003cc777f (&type->s_umount_key#84/1){+.+.}, at: sget_userns+0x208/0xd30 [ 1456.758329] 1 lock held by syz-executor.2/4521: [ 1456.763118] #0: 000000009f594b71 (event_mutex){+.+.}, at: perf_trace_destroy+0x28/0x100 [ 1456.779591] [ 1456.781307] ============================================= [ 1456.781307] [ 1456.795084] NMI backtrace for cpu 0 [ 1456.798927] CPU: 0 PID: 1031 Comm: khungtaskd Not tainted 4.19.36 #4 [ 1456.805639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.815192] Call Trace: [ 1456.817815] dump_stack+0x172/0x1f0 [ 1456.822198] nmi_cpu_backtrace.cold+0x63/0xa4 [ 1456.826813] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1456.831785] nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 [ 1456.837120] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1456.842430] watchdog+0x9df/0xee0 [ 1456.845915] kthread+0x357/0x430 [ 1456.849321] ? reset_hung_task_detector+0x30/0x30 [ 1456.854196] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 1456.859694] ret_from_fork+0x3a/0x50 [ 1456.864462] Sending NMI from CPU 0 to CPUs 1: [ 1456.869605] NMI backtrace for cpu 1 [ 1456.869611] CPU: 1 PID: 24 Comm: kworker/1:1 Not tainted 4.19.36 #4 [ 1456.869619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.869623] Workqueue: events rtc_timer_do_work [ 1456.869631] RIP: 0010:preempt_count_add+0x2c/0x1b0 [ 1456.869643] Code: 00 00 00 00 00 fc ff df 55 48 89 e5 41 54 41 89 fc 53 48 c7 c3 20 f6 35 8a 48 89 da 48 c1 ea 03 0f b6 14 02 48 89 d8 83 e0 07 <83> c0 03 38 d0 7c 08 84 d2 0f 85 4f 01 00 00 8b 0d 8f 74 ec 08 85 [ 1456.869647] RSP: 0018:ffff8880aa3e7b20 EFLAGS: 00000246 [ 1456.869656] RAX: 0000000000000000 RBX: ffffffff8a35f620 RCX: ffffffff8159a151 [ 1456.869662] RDX: 0000000000000004 RSI: 0000000000000004 RDI: 0000000000000001 [ 1456.869668] RBP: ffff8880aa3e7b30 R08: 1ffff11015d24732 R09: ffffed1015d24733 [ 1456.869674] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000001 [ 1456.869679] R13: ffff88809f6c2a10 R14: dffffc0000000000 R15: 16862c39ec213600 [ 1456.869686] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1456.869691] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1456.869696] CR2: 0000000002497db0 CR3: 000000000866d000 CR4: 00000000001426e0 [ 1456.869700] Call Trace: [ 1456.869704] rcu_lockdep_current_cpu_online+0x37/0x1c0 [ 1456.869709] rcu_read_lock_sched_held+0x97/0x130 [ 1456.869713] rtc_timer_do_work+0x7e5/0xf00 [ 1456.869717] ? mark_held_locks+0x100/0x100 [ 1456.869721] ? kasan_check_read+0x11/0x20 [ 1456.869726] ? rtc_irq_set_freq+0x3a0/0x3a0 [ 1456.869730] ? perf_trace_lock+0x510/0x510 [ 1456.869734] ? __lock_is_held+0xb6/0x140 [ 1456.869738] process_one_work+0x98e/0x1760 [ 1456.869742] ? rtc_irq_set_freq+0x3a0/0x3a0 [ 1456.869747] ? process_one_work+0x98e/0x1760 [ 1456.869751] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1456.869755] ? lock_acquire+0x16f/0x3f0 [ 1456.869759] ? kasan_check_write+0x14/0x20 [ 1456.869764] ? do_raw_spin_lock+0xc8/0x240 [ 1456.869768] worker_thread+0x98/0xe40 [ 1456.869772] ? trace_hardirqs_on+0x67/0x230 [ 1456.869776] kthread+0x357/0x430 [ 1456.869780] ? process_one_work+0x1760/0x1760 [ 1456.869785] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 1456.869789] ret_from_fork+0x3a/0x50 [ 1456.878730] Kernel panic - not syncing: hung_task: blocked tasks [ 1457.081798] CPU: 0 PID: 1031 Comm: khungtaskd Not tainted 4.19.36 #4 [ 1457.088312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1457.097684] Call Trace: [ 1457.100473] dump_stack+0x172/0x1f0 [ 1457.104313] panic+0x263/0x51d [ 1457.107533] ? __warn_printk+0xf3/0xf3 [ 1457.111441] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1457.116415] ? ___preempt_schedule+0x16/0x18 [ 1457.120857] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 1457.126435] ? nmi_trigger_cpumask_backtrace+0x1c1/0x1f8 [ 1457.131918] ? nmi_trigger_cpumask_backtrace+0x1cb/0x1f8 [ 1457.137520] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 1457.143010] watchdog+0x9f0/0xee0 [ 1457.146507] kthread+0x357/0x430 [ 1457.149899] ? reset_hung_task_detector+0x30/0x30 [ 1457.154771] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 1457.160254] ret_from_fork+0x3a/0x50 [ 1457.164880] Kernel Offset: disabled [ 1457.168559] Rebooting in 86400 seconds..