ffffc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000004, 0xfffb) ioctl(r2, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000380)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x10808410, 0x0) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x3000000000002, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x4) r5 = dup2(r4, 0xffffffffffffffff) mkdirat(r3, &(0x7f00000000c0)='./file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='security.ima\x00') r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x19, 0xfffffffffffffffe, 0x2, 0x100000001, 0xd1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r6, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0xffffffffffffff3a, &(0x7f0000000180)=0x5) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)) fcntl$getown(r6, 0x9) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000200)) r9 = gettid() ioprio_get$pid(0x20000000006, r9) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x8, 0x2, 0x2000000089, 0x3, 0xca, 0xca30}) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e}, 0x0, 0x0, r8, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x3, 0x0, 0x80000000, 0x80, 0x4}, 0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x400000, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) 07:50:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="16dc1f123c123f319bd070") syz_execute_func(&(0x7f0000000380)="b13691cd80c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0f014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47edcfd7cfd7c652642d1fb26400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f2400f125200111d54111d00") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) dup3(r2, r1, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x200000d) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) [ 1189.750263] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1189.847499] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 07:50:01 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000004, 0xfffb) ioctl(r2, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000380)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x10808410, 0x0) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x3000000000002, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x4) r5 = dup2(r4, 0xffffffffffffffff) mkdirat(r3, &(0x7f00000000c0)='./file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='security.ima\x00') r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x19, 0xfffffffffffffffe, 0x2, 0x100000001, 0xd1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r6, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0xffffffffffffff3a, &(0x7f0000000180)=0x5) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)) fcntl$getown(r6, 0x9) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000200)) r9 = gettid() ioprio_get$pid(0x20000000006, r9) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x8, 0x2, 0x2000000089, 0x3, 0xca, 0xca30}) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e}, 0x0, 0x0, r8, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x3, 0x0, 0x80000000, 0x80, 0x4}, 0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x400000, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) 07:50:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000004, 0xfffb) ioctl(r2, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000380)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x10808410, 0x0) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x3000000000002, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x4) r5 = dup2(r4, 0xffffffffffffffff) mkdirat(r3, &(0x7f00000000c0)='./file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='security.ima\x00') r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x19, 0xfffffffffffffffe, 0x2, 0x100000001, 0xd1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r6, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0xffffffffffffff3a, &(0x7f0000000180)=0x5) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)) fcntl$getown(r6, 0x9) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000200)) r9 = gettid() ioprio_get$pid(0x20000000006, r9) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x8, 0x2, 0x2000000089, 0x3, 0xca, 0xca30}) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e}, 0x0, 0x0, r8, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x3, 0x0, 0x80000000, 0x80, 0x4}, 0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x400000, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) 07:50:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000004, 0xfffb) ioctl(r2, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000380)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x10808410, 0x0) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x3000000000002, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x4) r5 = dup2(r4, 0xffffffffffffffff) mkdirat(r3, &(0x7f00000000c0)='./file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='security.ima\x00') r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x19, 0xfffffffffffffffe, 0x2, 0x100000001, 0xd1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r6, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0xffffffffffffff3a, &(0x7f0000000180)=0x5) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)) fcntl$getown(r6, 0x9) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000200)) r9 = gettid() ioprio_get$pid(0x20000000006, r9) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x8, 0x2, 0x2000000089, 0x3, 0xca, 0xca30}) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e}, 0x0, 0x0, r8, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x3, 0x0, 0x80000000, 0x80, 0x4}, 0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x400000, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) [ 1190.810188] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:50:02 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000c40)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4004, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@sq={'sq', 0x3d, 0x8}}, {@common=@access_any='access=any'}, {@rq={'rq', 0x3d, 0x6}}, {@common=@nodevmap='nodevmap'}, {@common=@access_user='access=user'}, {@rq={'rq'}}], [{@hash='hash'}]}}) 07:50:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000004, 0xfffb) ioctl(r2, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000380)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x10808410, 0x0) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x3000000000002, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x4) r5 = dup2(r4, 0xffffffffffffffff) mkdirat(r3, &(0x7f00000000c0)='./file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='security.ima\x00') r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x19, 0xfffffffffffffffe, 0x2, 0x100000001, 0xd1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r6, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0xffffffffffffff3a, &(0x7f0000000180)=0x5) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)) fcntl$getown(r6, 0x9) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000200)) r9 = gettid() ioprio_get$pid(0x20000000006, r9) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x8, 0x2, 0x2000000089, 0x3, 0xca, 0xca30}) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e}, 0x0, 0x0, r8, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x3, 0x0, 0x80000000, 0x80, 0x4}, 0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x400000, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) [ 1191.799906] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 07:50:03 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000004, 0xfffb) ioctl(r2, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000380)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x10808410, 0x0) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x3000000000002, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x4) r5 = dup2(r4, 0xffffffffffffffff) mkdirat(r3, &(0x7f00000000c0)='./file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='security.ima\x00') r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x19, 0xfffffffffffffffe, 0x2, 0x100000001, 0xd1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r6, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0xffffffffffffff3a, &(0x7f0000000180)=0x5) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)) fcntl$getown(r6, 0x9) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000200)) r9 = gettid() ioprio_get$pid(0x20000000006, r9) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x8, 0x2, 0x2000000089, 0x3, 0xca, 0xca30}) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e}, 0x0, 0x0, r8, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x3, 0x0, 0x80000000, 0x80, 0x4}, 0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x400000, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) [ 1192.224187] kauditd_printk_skb: 397 callbacks suppressed [ 1192.224196] audit: type=1400 audit(1557215403.813:1316): avc: denied { map } for pid=1655 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:03 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000c40)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4004, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@sq={'sq', 0x3d, 0x8}}, {@common=@access_any='access=any'}, {@rq={'rq', 0x3d, 0x6}}, {@common=@nodevmap='nodevmap'}, {@common=@access_user='access=user'}, {@rq={'rq'}}], [{@hash='hash'}]}}) 07:50:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000004, 0xfffb) ioctl(r2, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000380)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x10808410, 0x0) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x3000000000002, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x4) r5 = dup2(r4, 0xffffffffffffffff) mkdirat(r3, &(0x7f00000000c0)='./file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='security.ima\x00') r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x19, 0xfffffffffffffffe, 0x2, 0x100000001, 0xd1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r6, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0xffffffffffffff3a, &(0x7f0000000180)=0x5) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)) fcntl$getown(r6, 0x9) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000200)) r9 = gettid() ioprio_get$pid(0x20000000006, r9) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x8, 0x2, 0x2000000089, 0x3, 0xca, 0xca30}) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e}, 0x0, 0x0, r8, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x3, 0x0, 0x80000000, 0x80, 0x4}, 0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x400000, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) [ 1192.561814] audit: type=1400 audit(1557215403.833:1317): avc: denied { map } for pid=1657 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1192.758952] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:50:04 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x7, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0x2, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) [ 1192.880690] audit: type=1400 audit(1557215403.843:1318): avc: denied { map } for pid=1653 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="16dc1f123c123f319bd070") syz_execute_func(&(0x7f0000000380)="b13691cd80c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0f014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47edcfd7cfd7c652642d1fb26400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f2400f125200111d54111d00") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) dup3(r2, r1, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x200000d) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) [ 1193.109252] audit: type=1400 audit(1557215403.853:1319): avc: denied { map } for pid=1653 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:04 executing program 0: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x1c}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1193.346400] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1193.352417] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1193.352424] audit: audit_lost=82 audit_rate_limit=0 audit_backlog_limit=64 [ 1193.352428] audit: backlog limit exceeded [ 1193.372692] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1193.383465] audit: type=1400 audit(1557215403.913:1320): avc: denied { map } for pid=1666 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:05 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x7, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0x2, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 07:50:05 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000c40)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4004, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@sq={'sq', 0x3d, 0x8}}, {@common=@access_any='access=any'}, {@rq={'rq', 0x3d, 0x6}}, {@common=@nodevmap='nodevmap'}, {@common=@access_user='access=user'}, {@rq={'rq'}}], [{@hash='hash'}]}}) [ 1193.577578] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 07:50:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 07:50:05 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x800000018, &(0x7f0000001300)=0x7ff, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, 0x0, 0x0, 0xc001, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fe}]}, 0x10) sendto$inet6(r0, &(0x7f0000000140)="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", 0xf89, 0x0, 0x0, 0x0) 07:50:06 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x7, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0x2, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 07:50:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f0000000180)="64f34135a09d0000914319c8d257d25a7500ab5a4be2f9c4a175d27000a0edaa2869c10000a21998cfa8000f643e430a6f004441081262d3263d440fa0b74ee663ab16a0731111622640bd4f0c66c4e3791701007a6626f30f5c1a6254605e78bc3f1c2f1a5e3ef20f5d3066400f430f022ae20222a93944df83d842dd43343d0ff7e2f2e07d36b19f0f6da02878f82878f8450f2b088461da54949a9a3645d9f84d000d746d06af0c000000ca") 07:50:06 executing program 0: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x1c}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="16dc1f123c123f319bd070") syz_execute_func(&(0x7f0000000380)="b13691cd80c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0f014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47edcfd7cfd7c652642d1fb26400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f2400f125200111d54111d00") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) dup3(r2, r1, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x200000d) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) 07:50:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = dup(r1) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000040)) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x800, 0x0) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000fffffffb) 07:50:06 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x7, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0x2, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 07:50:07 executing program 5: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d90f1880070000005a2eab5b46340de2f9c4c1f9d434ed0e000000f7f7e4c653fb243a26430f381caad7000000a95ff9c441f2a28fb508eebce00000c4828599c9c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005660fdf10dfdf6736676666430fefb3000000000804f46766adebeb8fc84896df4a0420000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 07:50:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f0000000180)="64f34135a09d0000914319c8d257d25a7500ab5a4be2f9c4a175d27000a0edaa2869c10000a21998cfa8000f643e430a6f004441081262d3263d440fa0b74ee663ab16a0731111622640bd4f0c66c4e3791701007a6626f30f5c1a6254605e78bc3f1c2f1a5e3ef20f5d3066400f430f022ae20222a93944df83d842dd43343d0ff7e2f2e07d36b19f0f6da02878f82878f8450f2b088461da54949a9a3645d9f84d000d746d06af0c000000ca") 07:50:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 07:50:08 executing program 0: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x1c}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5b5e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20000000}, 0x81) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) [ 1197.232591] kauditd_printk_skb: 293 callbacks suppressed [ 1197.232628] audit: type=1400 audit(1557215408.823:1560): avc: denied { map } for pid=1758 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1197.472507] audit: type=1400 audit(1557215408.823:1561): avc: denied { map } for pid=1758 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1197.732864] audit: type=1400 audit(1557215408.813:1559): avc: denied { map } for pid=1756 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:09 executing program 5: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d90f1880070000005a2eab5b46340de2f9c4c1f9d434ed0e000000f7f7e4c653fb243a26430f381caad7000000a95ff9c441f2a28fb508eebce00000c4828599c9c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005660fdf10dfdf6736676666430fefb3000000000804f46766adebeb8fc84896df4a0420000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 07:50:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f0000000180)="64f34135a09d0000914319c8d257d25a7500ab5a4be2f9c4a175d27000a0edaa2869c10000a21998cfa8000f643e430a6f004441081262d3263d440fa0b74ee663ab16a0731111622640bd4f0c66c4e3791701007a6626f30f5c1a6254605e78bc3f1c2f1a5e3ef20f5d3066400f430f022ae20222a93944df83d842dd43343d0ff7e2f2e07d36b19f0f6da02878f82878f8450f2b088461da54949a9a3645d9f84d000d746d06af0c000000ca") 07:50:09 executing program 0: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x1c}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 07:50:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5b5e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20000000}, 0x81) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1198.019068] audit: type=1400 audit(1557215408.823:1562): avc: denied { map } for pid=1756 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.199269] audit: type=1400 audit(1557215408.873:1563): avc: denied { map } for pid=1747 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.402784] audit: type=1400 audit(1557215408.893:1565): avc: denied { map } for pid=1747 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.603426] audit: type=1400 audit(1557215408.903:1566): avc: denied { map } for pid=1758 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.814395] audit: type=1400 audit(1557215408.903:1567): avc: denied { map } for pid=1756 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1199.077732] audit: type=1400 audit(1557215408.883:1564): avc: denied { map } for pid=1754 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) [ 1199.227388] audit: audit_backlog=65 > audit_backlog_limit=64 07:50:10 executing program 5: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d90f1880070000005a2eab5b46340de2f9c4c1f9d434ed0e000000f7f7e4c653fb243a26430f381caad7000000a95ff9c441f2a28fb508eebce00000c4828599c9c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005660fdf10dfdf6736676666430fefb3000000000804f46766adebeb8fc84896df4a0420000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 07:50:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c1207849bd070") syz_execute_func(&(0x7f0000000180)="64f34135a09d0000914319c8d257d25a7500ab5a4be2f9c4a175d27000a0edaa2869c10000a21998cfa8000f643e430a6f004441081262d3263d440fa0b74ee663ab16a0731111622640bd4f0c66c4e3791701007a6626f30f5c1a6254605e78bc3f1c2f1a5e3ef20f5d3066400f430f022ae20222a93944df83d842dd43343d0ff7e2f2e07d36b19f0f6da02878f82878f8450f2b088461da54949a9a3645d9f84d000d746d06af0c000000ca") 07:50:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 07:50:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="b13691b869ef69dc00d9467d0680c4ab39fd5bf976f9e2c7c7e4c653fb0f8f0928019c110d000000c482f10bb472cb5d2666b6b63af4a95ff9c44184233d5c0c49cdeded48eebce0004d008020000021fcc128eac461a1f8a100000021c4e189d8a42973858e2c0f1867463bd9f265664157c481a4146faf1fc4633538c1220f0d18c401fe5ff666450f123c167593776666430fefb3000000000004f414111d54111d00") 07:50:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5b5e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20000000}, 0x81) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 07:50:12 executing program 5: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d90f1880070000005a2eab5b46340de2f9c4c1f9d434ed0e000000f7f7e4c653fb243a26430f381caad7000000a95ff9c441f2a28fb508eebce00000c4828599c9c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005660fdf10dfdf6736676666430fefb3000000000804f46766adebeb8fc84896df4a0420000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 07:50:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5b5e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20000000}, 0x81) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="b13691b869ef69dc00d9467d0680c4ab39fd5bf976f9e2c7c7e4c653fb0f8f0928019c110d000000c482f10bb472cb5d2666b6b63af4a95ff9c44184233d5c0c49cdeded48eebce0004d008020000021fcc128eac461a1f8a100000021c4e189d8a42973858e2c0f1867463bd9f265664157c481a4146faf1fc4633538c1220f0d18c401fe5ff666450f123c167593776666430fefb3000000000004f414111d54111d00") 07:50:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, 0x0, 0x0) 07:50:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xfd8000)=nil, 0xfd8000, 0x80002, 0x32, 0xffffffffffffffff, 0x0) r1 = eventfd2(0xffffffffffffffe0, 0x0) read$eventfd(r1, &(0x7f0000000040), 0x61) 07:50:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, 0x0, 0x0) 07:50:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xfd8000)=nil, 0xfd8000, 0x80002, 0x32, 0xffffffffffffffff, 0x0) r1 = eventfd2(0xffffffffffffffe0, 0x0) read$eventfd(r1, &(0x7f0000000040), 0x61) 07:50:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 07:50:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x5c}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") readv(0xffffffffffffffff, &(0x7f0000001780)=[{&(0x7f00000005c0)=""/5, 0x5}, {&(0x7f0000000600)=""/188, 0xbc}], 0x2) r1 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x8, {0x2, 0x0, @remote}, 'erspan0\x00'}) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:50:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, 0x0, 0x0) 07:50:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="b13691b869ef69dc00d9467d0680c4ab39fd5bf976f9e2c7c7e4c653fb0f8f0928019c110d000000c482f10bb472cb5d2666b6b63af4a95ff9c44184233d5c0c49cdeded48eebce0004d008020000021fcc128eac461a1f8a100000021c4e189d8a42973858e2c0f1867463bd9f265664157c481a4146faf1fc4633538c1220f0d18c401fe5ff666450f123c167593776666430fefb3000000000004f414111d54111d00") [ 1202.784876] kauditd_printk_skb: 178 callbacks suppressed [ 1202.784884] audit: type=1400 audit(1557215414.373:1744): avc: denied { map } for pid=1829 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xfd8000)=nil, 0xfd8000, 0x80002, 0x32, 0xffffffffffffffff, 0x0) r1 = eventfd2(0xffffffffffffffe0, 0x0) read$eventfd(r1, &(0x7f0000000040), 0x61) [ 1202.963644] audit: type=1400 audit(1557215414.383:1745): avc: denied { map } for pid=1829 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.129664] audit: type=1400 audit(1557215414.393:1746): avc: denied { map } for pid=1829 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.362620] audit: type=1400 audit(1557215414.403:1747): avc: denied { map } for pid=1829 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, 0x0, 0x0) [ 1203.589805] audit: type=1400 audit(1557215414.433:1748): avc: denied { map } for pid=1829 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.814869] audit: type=1400 audit(1557215414.473:1749): avc: denied { map } for pid=1829 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xfd8000)=nil, 0xfd8000, 0x80002, 0x32, 0xffffffffffffffff, 0x0) r1 = eventfd2(0xffffffffffffffe0, 0x0) read$eventfd(r1, &(0x7f0000000040), 0x61) 07:50:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x5c}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:15 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000190001f0008000361731ed640adfa90100b70006000000cc08000f00fed70000", 0x24) [ 1204.026771] audit: type=1400 audit(1557215414.473:1750): avc: denied { map } for pid=1829 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1204.279657] audit: type=1400 audit(1557215414.483:1751): avc: denied { map } for pid=1830 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="b13691b869ef69dc00d9467d0680c4ab39fd5bf976f9e2c7c7e4c653fb0f8f0928019c110d000000c482f10bb472cb5d2666b6b63af4a95ff9c44184233d5c0c49cdeded48eebce0004d008020000021fcc128eac461a1f8a100000021c4e189d8a42973858e2c0f1867463bd9f265664157c481a4146faf1fc4633538c1220f0d18c401fe5ff666450f123c167593776666430fefb3000000000004f414111d54111d00") 07:50:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0x4) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0x7, 0x0, 0x70c000, 0x0, 0x2}}) [ 1204.430431] audit: type=1400 audit(1557215414.503:1752): avc: denied { map } for pid=1830 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1204.598571] audit: audit_backlog=65 > audit_backlog_limit=64 07:50:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") 07:50:17 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000190001f0008000361731ed640adfa90100b70006000000cc08000f00fed70000", 0x24) 07:50:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x14, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00fb3c0000ec72985c343a9f67cf"], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:50:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x5c}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:17 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000190001f0008000361731ed640adfa90100b70006000000cc08000f00fed70000", 0x24) 07:50:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000080)) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000680)) syz_open_dev$binder(0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x0, 0x7]}, 0x5c) 07:50:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x14, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00fb3c0000ec72985c343a9f67cf"], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:50:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 07:50:17 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="24000000190001f0008000361731ed640adfa90100b70006000000cc08000f00fed70000", 0x24) 07:50:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000080)) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000680)) syz_open_dev$binder(0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x0, 0x7]}, 0x5c) 07:50:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") 07:50:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x14, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00fb3c0000ec72985c343a9f67cf"], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:50:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") 07:50:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000080)) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000680)) syz_open_dev$binder(0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x0, 0x7]}, 0x5c) 07:50:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x5c}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000080)) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000680)) syz_open_dev$binder(0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x0, 0x7]}, 0x5c) 07:50:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x14, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00fb3c0000ec72985c343a9f67cf"], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1207.829792] kauditd_printk_skb: 188 callbacks suppressed [ 1207.829801] audit: type=1400 audit(1557215419.413:1939): avc: denied { map } for pid=1919 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000080)) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000680)) syz_open_dev$binder(0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x0, 0x7]}, 0x5c) [ 1208.093623] audit: type=1400 audit(1557215419.473:1940): avc: denied { map } for pid=1919 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.347043] audit: type=1400 audit(1557215419.573:1941): avc: denied { map } for pid=1919 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000080)) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000680)) syz_open_dev$binder(0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x0, 0x7]}, 0x5c) 07:50:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="416bf4c04a2ae92ca842980f050f427ce444c4a37bf0c50241e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b26660f38091e2fdee5bebec42104ca67f30f167800c421dd584243c4e10bf8d4d9c0620f66420f5dc423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf8466f2ab440fec3fc4423d9f9346000000660f79ce768a899294d80200490f2d8f0b000000c2a0c10b00ccf0428385000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa6f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa67f243a75c450f91f3dada0f5ea5a9a50000ffbedc4e61c9553131b83a00a2b0fbfb3b62") [ 1208.537012] audit: type=1400 audit(1557215419.573:1942): avc: denied { map } for pid=1922 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.706274] audit: type=1400 audit(1557215419.573:1943): avc: denied { map } for pid=1919 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:20 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/222, 0xde}, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') writev(r1, &(0x7f0000000080), 0x1a6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1209.019848] audit: type=1400 audit(1557215419.573:1944): avc: denied { map } for pid=1922 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:20 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) poll(0x0, 0x0, 0x84d8) rmdir(&(0x7f0000000580)='./file0\x00') [ 1209.141424] audit: type=1400 audit(1557215419.583:1945): avc: denied { map } for pid=1924 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000080)) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000680)) syz_open_dev$binder(0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x0, 0x7]}, 0x5c) [ 1209.353027] audit: type=1400 audit(1557215419.603:1946): avc: denied { map } for pid=1924 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x8, 0x4, [@TIPC_NLA_LINK_PROP={0x4}]}]}, 0x1c}}, 0x0) ioctl(r0, 0x801000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80000806, 0x0) write$FUSE_INIT(r1, &(0x7f00000001c0)={0x50}, 0x3ef) [ 1209.563693] audit: type=1400 audit(1557215419.613:1947): avc: denied { map } for pid=1922 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1209.769476] audit: type=1400 audit(1557215419.633:1948): avc: denied { map } for pid=1924 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") 07:50:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/222, 0xde}, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') writev(r1, &(0x7f0000000080), 0x1a6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:50:22 executing program 3: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000600)="f259afafcd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aef3663e65f2400f9ac37c730f66400f3833fe8f0f14e7e701fe5353e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x8, 0x4, [@TIPC_NLA_LINK_PROP={0x4}]}]}, 0x1c}}, 0x0) ioctl(r0, 0x801000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80000806, 0x0) write$FUSE_INIT(r1, &(0x7f00000001c0)={0x50}, 0x3ef) 07:50:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") 07:50:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/222, 0xde}, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') writev(r1, &(0x7f0000000080), 0x1a6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:50:22 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) poll(0x0, 0x0, 0x84d8) rmdir(&(0x7f0000000580)='./file0\x00') 07:50:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x8, 0x4, [@TIPC_NLA_LINK_PROP={0x4}]}]}, 0x1c}}, 0x0) ioctl(r0, 0x801000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80000806, 0x0) write$FUSE_INIT(r1, &(0x7f00000001c0)={0x50}, 0x3ef) 07:50:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/222, 0xde}, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') writev(r1, &(0x7f0000000080), 0x1a6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:50:23 executing program 3: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000600)="f259afafcd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aef3663e65f2400f9ac37c730f66400f3833fe8f0f14e7e701fe5353e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x8, 0x4, [@TIPC_NLA_LINK_PROP={0x4}]}]}, 0x1c}}, 0x0) ioctl(r0, 0x801000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80000806, 0x0) write$FUSE_INIT(r1, &(0x7f00000001c0)={0x50}, 0x3ef) 07:50:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") 07:50:23 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) poll(0x0, 0x0, 0x84d8) rmdir(&(0x7f0000000580)='./file0\x00') 07:50:24 executing program 1: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000600)="f259afafcd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aef3663e65f2400f9ac37c730f66400f3833fe8f0f14e7e701fe5353e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1212.878889] kauditd_printk_skb: 157 callbacks suppressed [ 1212.878898] audit: type=1400 audit(1557215424.463:2106): avc: denied { map } for pid=1998 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmctl$IPC_RMID(r1, 0x0) shmdt(r2) 07:50:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="65f34135a09d002a9145e1645aab5a4be2f9c4a175d27000d483595a983a0074e140ea00000000250521f30f59d5c6aa3e564308c200c20078e2e04b4ee663ab660f582026001a4f6cc402ad09e52131cc363e36660f3a601d6b3c5b014ef0801e533667f570450e3200c4e1f9c5c10002845662d9ad9b00000080c4bd969144df838342ddc9c4c2bdb85955f26cc64661973ef0a60284fe0284fe2a440cdada52101e746d36c4af0cfb0000") [ 1213.167119] audit: type=1400 audit(1557215424.533:2107): avc: denied { map } for pid=1998 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:24 executing program 3: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000600)="f259afafcd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aef3663e65f2400f9ac37c730f66400f3833fe8f0f14e7e701fe5353e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1213.404289] audit: type=1400 audit(1557215424.573:2108): avc: denied { map } for pid=2001 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmctl$IPC_RMID(r1, 0x0) shmdt(r2) [ 1213.605603] audit: type=1400 audit(1557215424.593:2109): avc: denied { map } for pid=2001 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1213.790583] audit: type=1400 audit(1557215424.613:2110): avc: denied { map } for pid=1998 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:25 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) poll(0x0, 0x0, 0x84d8) rmdir(&(0x7f0000000580)='./file0\x00') [ 1213.962739] audit: type=1400 audit(1557215424.623:2111): avc: denied { map } for pid=2001 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:25 executing program 1: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000600)="f259afafcd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aef3663e65f2400f9ac37c730f66400f3833fe8f0f14e7e701fe5353e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1214.177556] audit: type=1400 audit(1557215424.623:2112): avc: denied { map } for pid=2001 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="65f34135a09d002a9145e1645aab5a4be2f9c4a175d27000d483595a983a0074e140ea00000000250521f30f59d5c6aa3e564308c200c20078e2e04b4ee663ab660f582026001a4f6cc402ad09e52131cc363e36660f3a601d6b3c5b014ef0801e533667f570450e3200c4e1f9c5c10002845662d9ad9b00000080c4bd969144df838342ddc9c4c2bdb85955f26cc64661973ef0a60284fe0284fe2a440cdada52101e746d36c4af0cfb0000") [ 1214.349389] audit: type=1400 audit(1557215424.633:2113): avc: denied { map } for pid=1998 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmctl$IPC_RMID(r1, 0x0) shmdt(r2) [ 1214.578390] audit: type=1400 audit(1557215424.643:2114): avc: denied { map } for pid=2002 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1214.780488] audit: type=1400 audit(1557215424.643:2115): avc: denied { map } for pid=2002 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:26 executing program 3: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000600)="f259afafcd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aef3663e65f2400f9ac37c730f66400f3833fe8f0f14e7e701fe5353e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmctl$IPC_RMID(r1, 0x0) shmdt(r2) 07:50:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmctl$IPC_RMID(r1, 0x0) shmdt(r2) 07:50:27 executing program 1: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000600)="f259afafcd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aef3663e65f2400f9ac37c730f66400f3833fe8f0f14e7e701fe5353e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000200)=@ethtool_dump={0x4e}}) 07:50:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="65f34135a09d002a9145e1645aab5a4be2f9c4a175d27000d483595a983a0074e140ea00000000250521f30f59d5c6aa3e564308c200c20078e2e04b4ee663ab660f582026001a4f6cc402ad09e52131cc363e36660f3a601d6b3c5b014ef0801e533667f570450e3200c4e1f9c5c10002845662d9ad9b00000080c4bd969144df838342ddc9c4c2bdb85955f26cc64661973ef0a60284fe0284fe2a440cdada52101e746d36c4af0cfb0000") 07:50:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fanotify_init(0x14, 0x0) 07:50:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmctl$IPC_RMID(r1, 0x0) shmdt(r2) 07:50:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000200)=@ethtool_dump={0x4e}}) 07:50:28 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001400)=[{&(0x7f0000000180)="1c922799d34f9c4f92faac0e3ae17c4e08c4a4b1e301bd6e0002000072d6d6825db88600d4da37bfac468f69dcc840b2002941854a07b1372183c8890bf8d354947a6fee5a15c09b4d58a6860c1145eadaa938dabd334fa7e04c6630669b509918892fb9306142e8bb8842f8068621da5a73bb65a288318950bdd6e0d3655877cb14a32028f766656c16310025c0d2279deff99264cd1c09b6c6e8719715985031b4fdaf3c2b3bb10727a44f1129b00c4136426063ef7d7aa8f2318c9bcebeb6bbfc86923025727b170cb4a44e905d40f2c5430d81733f74ac757c40c562edc2b8bb3f037cd00dd6aca23a3861c7daf1b939ed617c30135835ca2a0315d2dbe1e2a039dfa3ef56f5ff674087d3272ef3f1f3ef890ae8ed141c4522474b0e818c997088d07a11c09b7eab07772ce233d5c6aad411e78dd0f14f91562ba8d98efaee32174def6871de7e9f2821749297cb92fd02c538dfbd5d114cd68b00769860e685b734c5cc61b03201cc1e70a50f6b7e1fd15ebc53047db6031e56b3bc35d42102b92d523fc3f3d344ff8d1c9469faa49e2071ca61588c0a210b2401d6d58d28d8612f8be9c9e7d0fd1d1fa637edb68cc55888ccc881e610ca6e2456b22c39ed7392cffa644dc30827", 0x1ca, 0x36}]) 07:50:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") dup(0xffffffffffffffff) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c481c5fa8a00080000c4014cb63a3af4b97ff9c44149f2168f4808eebce00000802000c421fc51c12aea01efc48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") mlockall(0x1) 07:50:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") munmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) r2 = shmat(r1, &(0x7f0000ff6000/0x2000)=nil, 0x0) shmctl$IPC_RMID(r1, 0x0) shmdt(r2) 07:50:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000200)=@ethtool_dump={0x4e}}) [ 1217.323613] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 [ 1217.369644] loop3: p1 start 3778678444 is beyond EOD, truncated [ 1217.414535] loop3: p2 start 1185726263 is beyond EOD, truncated 07:50:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) [ 1217.455564] loop3: p3 start 358280815 is beyond EOD, truncated [ 1217.493107] loop3: p4 start 2300090704 is beyond EOD, truncated [ 1217.539852] loop3: p5 start 1708384470 is beyond EOD, truncated [ 1217.609204] loop3: p6 start 3333818652 is beyond EOD, truncated 07:50:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000200)=@ethtool_dump={0x4e}}) [ 1217.651639] loop3: p7 start 4016267330 is beyond EOD, truncated [ 1217.690551] loop3: p8 start 3320987741 is beyond EOD, truncated 07:50:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000002c0)="65f34135a09d002a9145e1645aab5a4be2f9c4a175d27000d483595a983a0074e140ea00000000250521f30f59d5c6aa3e564308c200c20078e2e04b4ee663ab660f582026001a4f6cc402ad09e52131cc363e36660f3a601d6b3c5b014ef0801e533667f570450e3200c4e1f9c5c10002845662d9ad9b00000080c4bd969144df838342ddc9c4c2bdb85955f26cc64661973ef0a60284fe0284fe2a440cdada52101e746d36c4af0cfb0000") [ 1217.730120] loop3: p9 start 3345037370 is beyond EOD, truncated 07:50:29 executing program 5: ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={0x0, 0x0, &(0x7f000000e000)={&(0x7f0000000080)={0x14, 0x20, 0xffffffffffffffff}, 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) [ 1217.771331] loop3: p10 start 1744827734 is beyond EOD, truncated [ 1217.909352] kauditd_printk_skb: 174 callbacks suppressed [ 1217.909359] audit: type=1400 audit(1557215429.493:2290): avc: denied { map } for pid=2072 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:29 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001400)=[{&(0x7f0000000180)="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", 0x1ca, 0x36}]) [ 1218.132025] audit: type=1400 audit(1557215429.563:2291): avc: denied { map } for pid=2073 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) [ 1218.293442] audit: type=1400 audit(1557215429.563:2292): avc: denied { map } for pid=2073 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:30 executing program 0: socket$inet_sctp(0x2, 0x3, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000000)=0x2c2a, 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = pkey_alloc(0x0, 0x1) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x7f, 0x8001, 0xfffffffffffffff8, 0xf79, 0x100000000, 0x9}) ioctl$RTC_PIE_OFF(r0, 0x7006) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, r1) unshare(0x40000000) [ 1218.432421] audit: type=1400 audit(1557215429.563:2293): avc: denied { map } for pid=2073 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") dup(0xffffffffffffffff) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c481c5fa8a00080000c4014cb63a3af4b97ff9c44149f2168f4808eebce00000802000c421fc51c12aea01efc48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") mlockall(0x1) [ 1218.665640] audit: type=1400 audit(1557215429.593:2294): avc: denied { map } for pid=2072 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:30 executing program 5: ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={0x0, 0x0, &(0x7f000000e000)={&(0x7f0000000080)={0x14, 0x20, 0xffffffffffffffff}, 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) [ 1218.852933] audit: type=1400 audit(1557215429.593:2295): avc: denied { map } for pid=2072 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.903189] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 [ 1218.936652] loop3: p1 start 3778678444 is beyond EOD, truncated [ 1218.994233] loop3: p2 start 1185726263 is beyond EOD, truncated [ 1219.047558] loop3: p3 start 358280815 is beyond EOD, truncated [ 1219.063826] audit: type=1400 audit(1557215429.613:2296): avc: denied { map } for pid=2072 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) [ 1219.095325] loop3: p4 start 2300090704 is beyond EOD, truncated [ 1219.171505] loop3: p5 start 1708384470 is beyond EOD, truncated [ 1219.237849] loop3: p6 start 3333818652 is beyond EOD, truncated [ 1219.274601] audit: type=1400 audit(1557215429.613:2297): avc: denied { map } for pid=2072 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1219.328804] loop3: p7 start 4016267330 is beyond EOD, truncated [ 1219.371845] loop3: p8 start 3320987741 is beyond EOD, truncated [ 1219.423582] loop3: p9 start 3345037370 is beyond EOD, truncated [ 1219.472349] loop3: p10 start 1744827734 is beyond EOD, truncated [ 1219.487145] audit: type=1400 audit(1557215429.623:2298): avc: denied { map } for pid=2073 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1219.578451] audit: audit_backlog=65 > audit_backlog_limit=64 07:50:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") dup(0xffffffffffffffff) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c481c5fa8a00080000c4014cb63a3af4b97ff9c44149f2168f4808eebce00000802000c421fc51c12aea01efc48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") mlockall(0x1) 07:50:31 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001400)=[{&(0x7f0000000180)="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", 0x1ca, 0x36}]) 07:50:31 executing program 5: ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={0x0, 0x0, &(0x7f000000e000)={&(0x7f0000000080)={0x14, 0x20, 0xffffffffffffffff}, 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) 07:50:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) [ 1220.540265] IPVS: ftp: loaded support on port[0] = 21 07:50:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") dup(0xffffffffffffffff) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c481c5fa8a00080000c4014cb63a3af4b97ff9c44149f2168f4808eebce00000802000c421fc51c12aea01efc48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") mlockall(0x1) 07:50:32 executing program 5: ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={0x0, 0x0, &(0x7f000000e000)={&(0x7f0000000080)={0x14, 0x20, 0xffffffffffffffff}, 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) [ 1220.702896] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 [ 1220.717210] loop3: p1 start 3778678444 is beyond EOD, truncated [ 1220.763518] loop3: p2 start 1185726263 is beyond EOD, truncated [ 1220.796358] loop3: p3 start 358280815 is beyond EOD, truncated 07:50:32 executing program 1: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x11}, 0x2, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1220.837514] loop3: p4 start 2300090704 is beyond EOD, truncated [ 1220.887636] loop3: p5 start 1708384470 is beyond EOD, truncated [ 1220.926474] loop3: p6 start 3333818652 is beyond EOD, truncated [ 1220.961816] loop3: p7 start 4016267330 is beyond EOD, truncated [ 1220.989813] loop3: p8 start 3320987741 is beyond EOD, truncated [ 1221.017726] loop3: p9 start 3345037370 is beyond EOD, truncated [ 1221.049083] loop3: p10 start 1744827734 is beyond EOD, truncated 07:50:32 executing program 0: socket$inet_sctp(0x2, 0x3, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000000)=0x2c2a, 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = pkey_alloc(0x0, 0x1) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x7f, 0x8001, 0xfffffffffffffff8, 0xf79, 0x100000000, 0x9}) ioctl$RTC_PIE_OFF(r0, 0x7006) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, r1) unshare(0x40000000) 07:50:32 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001400)=[{&(0x7f0000000180)="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", 0x1ca, 0x36}]) 07:50:33 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev={0xac, 0x70}, {[@timestamp={0x32000, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 1221.592477] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:50:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") dup(0xffffffffffffffff) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c481c5fa8a00080000c4014cb63a3af4b97ff9c44149f2168f4808eebce00000802000c421fc51c12aea01efc48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") mlockall(0x1) 07:50:33 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev={0xac, 0x70}, {[@timestamp={0x32000, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 1222.162076] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 [ 1222.235461] loop3: p1 start 3778678444 is beyond EOD, truncated [ 1222.257587] ima: Can not allocate sm3-256 (reason: -2) [ 1222.297402] loop3: p2 start 1185726263 is beyond EOD, truncated 07:50:33 executing program 1: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x11}, 0x2, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 1222.364159] loop3: p3 start 358280815 is beyond EOD, truncated [ 1222.407897] loop3: p4 start 2300090704 is beyond EOD, truncated [ 1222.453313] loop3: p5 start 1708384470 is beyond EOD, truncated [ 1222.498587] loop3: p6 start 3333818652 is beyond EOD, truncated [ 1222.535514] loop3: p7 start 4016267330 is beyond EOD, truncated 07:50:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") dup(0xffffffffffffffff) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c481c5fa8a00080000c4014cb63a3af4b97ff9c44149f2168f4808eebce00000802000c421fc51c12aea01efc48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") mlockall(0x1) [ 1222.574387] loop3: p8 start 3320987741 is beyond EOD, truncated [ 1222.619086] loop3: p9 start 3345037370 is beyond EOD, truncated [ 1222.648467] loop3: p10 start 1744827734 is beyond EOD, truncated 07:50:34 executing program 0: socket$inet_sctp(0x2, 0x3, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000000)=0x2c2a, 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = pkey_alloc(0x0, 0x1) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x7f, 0x8001, 0xfffffffffffffff8, 0xf79, 0x100000000, 0x9}) ioctl$RTC_PIE_OFF(r0, 0x7006) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, r1) unshare(0x40000000) 07:50:34 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev={0xac, 0x70}, {[@timestamp={0x32000, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 1222.968053] kauditd_printk_skb: 234 callbacks suppressed [ 1222.968060] audit: type=1400 audit(1557215434.553:2495): avc: denied { map } for pid=2154 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1223.208125] audit: type=1400 audit(1557215434.593:2496): avc: denied { map } for pid=2154 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1223.406091] audit: type=1400 audit(1557215434.593:2497): avc: denied { map } for pid=2154 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1223.587790] audit: type=1400 audit(1557215434.593:2498): avc: denied { map } for pid=2154 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1223.735083] ima: Can not allocate sm3-256 (reason: -2) [ 1223.766233] audit: type=1400 audit(1557215434.633:2499): avc: denied { map } for pid=2154 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1223.941443] audit: type=1400 audit(1557215434.703:2500): avc: denied { map } for pid=2154 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1224.075887] audit: type=1400 audit(1557215434.703:2501): avc: denied { map } for pid=2154 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") dup(0xffffffffffffffff) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c481c5fa8a00080000c4014cb63a3af4b97ff9c44149f2168f4808eebce00000802000c421fc51c12aea01efc48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") mlockall(0x1) 07:50:35 executing program 1: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x11}, 0x2, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 07:50:35 executing program 3: socket(0x0, 0x2003, 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x80) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000011}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x44, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x35}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x87}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa78b6ec84fb8c5a0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 07:50:35 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev={0xac, 0x70}, {[@timestamp={0x32000, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 07:50:35 executing program 0: socket$inet_sctp(0x2, 0x3, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000000)=0x2c2a, 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = pkey_alloc(0x0, 0x1) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x7f, 0x8001, 0xfffffffffffffff8, 0xf79, 0x100000000, 0x9}) ioctl$RTC_PIE_OFF(r0, 0x7006) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, r1) unshare(0x40000000) [ 1224.285005] audit: type=1400 audit(1557215434.743:2502): avc: denied { map } for pid=2154 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:36 executing program 5: setresgid(0x0, 0xee00, 0x0) clone(0x4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getegid() tkill(r0, 0x13) setresgid(r1, 0x0, 0x0) prlimit64(r0, 0x0, 0x0, 0x0) [ 1224.485736] audit: type=1400 audit(1557215434.743:2503): avc: denied { map } for pid=2157 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0xf4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xb4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5b5e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x2c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x81) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1224.673517] audit: type=1400 audit(1557215434.773:2504): avc: denied { map } for pid=2157 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:36 executing program 3: socket(0x0, 0x2003, 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x80) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000011}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x44, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x35}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x87}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa78b6ec84fb8c5a0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x4000) [ 1225.110221] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1225.286434] ima: Can not allocate sm3-256 (reason: -2) 07:50:36 executing program 1: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x11}, 0x2, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 07:50:37 executing program 3: socket(0x0, 0x2003, 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x80) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000011}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x44, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x35}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x87}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa78b6ec84fb8c5a0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 07:50:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x7a, &(0x7f0000000100)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "a1bba9", 0x44, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000]}, @local, {[], @gre={{0x0, 0x501}}}}}}}, 0x0) 07:50:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0xf4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xb4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5b5e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x2c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x81) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1226.805905] ima: Can not allocate sm3-256 (reason: -2) 07:50:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r2, 0x125, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x20}}, 0x0) 07:50:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x7a, &(0x7f0000000100)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "a1bba9", 0x44, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000]}, @local, {[], @gre={{0x0, 0x501}}}}}}}, 0x0) 07:50:39 executing program 3: socket(0x0, 0x2003, 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x80) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000011}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x44, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x35}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x87}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa78b6ec84fb8c5a0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 07:50:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0xf4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xb4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5b5e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x2c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x81) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:39 executing program 5: setresgid(0x0, 0xee00, 0x0) clone(0x4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getegid() tkill(r0, 0x13) setresgid(r1, 0x0, 0x0) prlimit64(r0, 0x0, 0x0, 0x0) [ 1228.005254] kauditd_printk_skb: 258 callbacks suppressed [ 1228.005263] audit: type=1400 audit(1557215439.593:2709): avc: denied { create } for pid=2225 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 07:50:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r1, 0x29, 0x1c, &(0x7f00000000c0), 0x0) 07:50:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x7a, &(0x7f0000000100)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "a1bba9", 0x44, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000]}, @local, {[], @gre={{0x0, 0x501}}}}}}}, 0x0) 07:50:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff27}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600203f00000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000018000020000627c05000500001200000a00000000000000ff170000000000000000000800"/128], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a0009070000000000000000b3480005001a00ac1414aa000a00000000000000000000fe800a3f4811000000000000000000aa02000010"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 1228.217328] audit: type=1400 audit(1557215439.633:2710): avc: denied { create } for pid=2225 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 07:50:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_SOCK={0x4}]}, 0x24}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e18015a4ab38fd5bf9e2f9660f3a0fae5e090200bac7e4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43c4a19b5da2008000000f186746f340ae65657c7c730f8052043833fe8f2e2e263636410f2e5c647546d9f8fe5ff6e7df0804f4c441a5609c8bb80000005499") [ 1228.400923] audit: type=1400 audit(1557215439.673:2711): avc: denied { write } for pid=2225 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1228.600567] audit: type=1400 audit(1557215439.683:2713): avc: denied { map } for pid=2228 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1228.760105] audit: type=1400 audit(1557215439.683:2712): avc: denied { read } for pid=2225 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 07:50:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x7a, &(0x7f0000000100)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "a1bba9", 0x44, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000]}, @local, {[], @gre={{0x0, 0x501}}}}}}}, 0x0) [ 1228.938329] audit: type=1400 audit(1557215439.693:2714): avc: denied { write } for pid=2225 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 07:50:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff27}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600203f00000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000018000020000627c05000500001200000a00000000000000ff170000000000000000000800"/128], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a0009070000000000000000b3480005001a00ac1414aa000a00000000000000000000fe800a3f4811000000000000000000aa02000010"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 1229.130113] audit: type=1400 audit(1557215439.703:2715): avc: denied { map } for pid=2228 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1229.250077] audit: type=1400 audit(1557215439.713:2716): avc: denied { create } for pid=2225 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1229.316018] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1229.316572] audit: audit_backlog=65 > audit_backlog_limit=64 07:50:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000bc0000000000000000000000ba0018000000c105e4af704a6d3c8dcdbd99133f335d8b0e6906aa8d076b29f1a2cd3e8c8c"], 0x35}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") 07:50:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f0c3c123f319bd070") sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={0xf4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xb4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5b5e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x2c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x81) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c6ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f1ce7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r1, 0x29, 0x1c, &(0x7f00000000c0), 0x0) 07:50:41 executing program 5: setresgid(0x0, 0xee00, 0x0) clone(0x4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getegid() tkill(r0, 0x13) setresgid(r1, 0x0, 0x0) prlimit64(r0, 0x0, 0x0, 0x0) 07:50:41 executing program 0: syz_execute_func(&(0x7f0000000140)="1c19b5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216c4c1f8ae9600000100c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff7e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 07:50:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff27}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600203f00000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000018000020000627c05000500001200000a00000000000000ff170000000000000000000800"/128], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a0009070000000000000000b3480005001a00ac1414aa000a00000000000000000000fe800a3f4811000000000000000000aa02000010"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 07:50:42 executing program 0: syz_execute_func(&(0x7f0000000140)="1c19b5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216c4c1f8ae9600000100c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff7e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 07:50:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff27}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600203f00000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000018000020000627c05000500001200000a00000000000000ff170000000000000000000800"/128], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a0009070000000000000000b3480005001a00ac1414aa000a00000000000000000000fe800a3f4811000000000000000000aa02000010"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 07:50:42 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="a1c4fecae5e00ab5105f8fe55fd2241c38fe5992f9ef0cadc69113015a083e77", 0x20) 07:50:42 executing program 5: setresgid(0x0, 0xee00, 0x0) clone(0x4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getegid() tkill(r0, 0x13) setresgid(r1, 0x0, 0x0) prlimit64(r0, 0x0, 0x0, 0x0) 07:50:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000bc0000000000000000000000ba0018000000c105e4af704a6d3c8dcdbd99133f335d8b0e6906aa8d076b29f1a2cd3e8c8c"], 0x35}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") 07:50:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r1, 0x29, 0x1c, &(0x7f00000000c0), 0x0) 07:50:42 executing program 0: syz_execute_func(&(0x7f0000000140)="1c19b5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216c4c1f8ae9600000100c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff7e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 07:50:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000300)=@md5={0x1, "149b9f43d44925ac5d7590e6b6a9adff"}, 0x11, 0x98391aa8d00f7f6a) semctl$GETVAL(0x0, 0x2, 0xc, &(0x7f0000000140)=""/56) dup2(r1, 0xffffffffffffffff) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) uselib(&(0x7f0000000000)='./file0\x00') lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) 07:50:43 executing program 0: syz_execute_func(&(0x7f0000000140)="1c19b5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216c4c1f8ae9600000100c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff7e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 07:50:43 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="a1c4fecae5e00ab5105f8fe55fd2241c38fe5992f9ef0cadc69113015a083e77", 0x20) 07:50:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56eabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c0f20fd0b436f40000000f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa64680b0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") 07:50:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000bc0000000000000000000000ba0018000000c105e4af704a6d3c8dcdbd99133f335d8b0e6906aa8d076b29f1a2cd3e8c8c"], 0x35}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") 07:50:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r1, 0x29, 0x1c, &(0x7f00000000c0), 0x0) 07:50:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r2, 0x801}) 07:50:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000300)=@md5={0x1, "149b9f43d44925ac5d7590e6b6a9adff"}, 0x11, 0x98391aa8d00f7f6a) semctl$GETVAL(0x0, 0x2, 0xc, &(0x7f0000000140)=""/56) dup2(r1, 0xffffffffffffffff) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) uselib(&(0x7f0000000000)='./file0\x00') lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) [ 1233.011954] kauditd_printk_skb: 266 callbacks suppressed [ 1233.011963] audit: type=1400 audit(1557215444.603:2964): avc: denied { map } for pid=2337 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1233.172618] audit: type=1400 audit(1557215444.663:2965): avc: denied { map } for pid=2337 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1233.352511] audit: type=1400 audit(1557215444.683:2966): avc: denied { map } for pid=2337 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1233.610161] audit: type=1400 audit(1557215444.713:2967): avc: denied { map } for pid=2337 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r2, 0x801}) 07:50:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="a1c4fecae5e00ab5105f8fe55fd2241c38fe5992f9ef0cadc69113015a083e77", 0x20) [ 1233.900124] audit: type=1400 audit(1557215444.733:2968): avc: denied { map } for pid=2337 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000bc0000000000000000000000ba0018000000c105e4af704a6d3c8dcdbd99133f335d8b0e6906aa8d076b29f1a2cd3e8c8c"], 0x35}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") [ 1234.128361] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1234.134944] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1234.156109] audit: type=1400 audit(1557215444.733:2969): avc: denied { map } for pid=2342 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1234.221072] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1234.226911] audit: audit_lost=142 audit_rate_limit=0 audit_backlog_limit=64 07:50:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r2, 0x801}) 07:50:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000300)=@md5={0x1, "149b9f43d44925ac5d7590e6b6a9adff"}, 0x11, 0x98391aa8d00f7f6a) semctl$GETVAL(0x0, 0x2, 0xc, &(0x7f0000000140)=""/56) dup2(r1, 0xffffffffffffffff) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) uselib(&(0x7f0000000000)='./file0\x00') lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) 07:50:46 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 07:50:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="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") 07:50:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="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") 07:50:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r2, 0x801}) 07:50:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="a1c4fecae5e00ab5105f8fe55fd2241c38fe5992f9ef0cadc69113015a083e77", 0x20) 07:50:47 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 07:50:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000300)=@md5={0x1, "149b9f43d44925ac5d7590e6b6a9adff"}, 0x11, 0x98391aa8d00f7f6a) semctl$GETVAL(0x0, 0x2, 0xc, &(0x7f0000000140)=""/56) dup2(r1, 0xffffffffffffffff) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) uselib(&(0x7f0000000000)='./file0\x00') lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) 07:50:48 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000eed000)={0x2, 0x4e21, @remote}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 07:50:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="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") 07:50:48 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 07:50:48 executing program 4: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}]}, 0x34}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:49 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000eed000)={0x2, 0x4e21, @remote}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 07:50:49 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 1238.141218] kauditd_printk_skb: 249 callbacks suppressed [ 1238.141226] audit: type=1400 audit(1557215449.733:3199): avc: denied { map } for pid=2438 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.326964] audit: type=1400 audit(1557215449.773:3200): avc: denied { map } for pid=2438 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56eabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c0f20fd0b436f40000000f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa64680b0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") 07:50:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56eabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c0f20fd0b436f40000000f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa64680b0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") 07:50:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0xa0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3a14}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'caif0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d067f2412d00000000e1801c65ab39ff5bf9e2f9d7c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") 07:50:50 executing program 2: r0 = semget$private(0x0, 0x3, 0x400) semop(r0, 0x0, 0x1ad) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(0x0) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r5, 0x5424, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYRESOCT=r4, @ANYRES32=0x0, @ANYRESOCT, @ANYRES64], 0x0, 0x0, 0x820c01, 0x0) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 07:50:50 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000eed000)={0x2, 0x4e21, @remote}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 1238.505159] audit: type=1400 audit(1557215449.773:3201): avc: denied { map } for pid=2438 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.634651] audit: type=1400 audit(1557215449.803:3202): avc: denied { map } for pid=2438 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.815877] audit: type=1400 audit(1557215449.853:3203): avc: denied { map } for pid=2438 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.982241] audit: type=1400 audit(1557215449.893:3204): avc: denied { map } for pid=2438 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:50 executing program 4: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}]}, 0x34}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:50 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000eed000)={0x2, 0x4e21, @remote}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 1239.190265] audit: type=1400 audit(1557215449.903:3205): avc: denied { map } for pid=2438 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1239.436126] audit: type=1400 audit(1557215449.973:3206): avc: denied { map } for pid=2438 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:51 executing program 2: r0 = semget$private(0x0, 0x3, 0x400) semop(r0, 0x0, 0x1ad) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(0x0) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r5, 0x5424, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYRESOCT=r4, @ANYRES32=0x0, @ANYRESOCT, @ANYRES64], 0x0, 0x0, 0x820c01, 0x0) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) [ 1239.687767] audit: type=1400 audit(1557215449.983:3207): avc: denied { map } for pid=2438 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0xa0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3a14}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'caif0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d067f2412d00000000e1801c65ab39ff5bf9e2f9d7c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") [ 1239.922147] audit: type=1400 audit(1557215450.063:3208): avc: denied { map } for pid=2438 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:51 executing program 0: r0 = semget$private(0x0, 0x3, 0x400) semop(r0, 0x0, 0x1ad) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(0x0) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r5, 0x5424, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYRESOCT=r4, @ANYRES32=0x0, @ANYRESOCT, @ANYRES64], 0x0, 0x0, 0x820c01, 0x0) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 07:50:52 executing program 4: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}]}, 0x34}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:53 executing program 2: r0 = semget$private(0x0, 0x3, 0x400) semop(r0, 0x0, 0x1ad) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(0x0) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r5, 0x5424, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYRESOCT=r4, @ANYRES32=0x0, @ANYRESOCT, @ANYRES64], 0x0, 0x0, 0x820c01, 0x0) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 07:50:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f0000000e40)="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") 07:50:53 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) prctl$PR_SET_THP_DISABLE(0x29, 0x1) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000540)=""/229) 07:50:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0xa0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3a14}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'caif0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d067f2412d00000000e1801c65ab39ff5bf9e2f9d7c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") 07:50:53 executing program 0: r0 = semget$private(0x0, 0x3, 0x400) semop(r0, 0x0, 0x1ad) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(0x0) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r5, 0x5424, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYRESOCT=r4, @ANYRES32=0x0, @ANYRESOCT, @ANYRES64], 0x0, 0x0, 0x820c01, 0x0) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 07:50:54 executing program 4: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}]}, 0x34}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:50:54 executing program 2: r0 = semget$private(0x0, 0x3, 0x400) semop(r0, 0x0, 0x1ad) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(0x0) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r5, 0x5424, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYRESOCT=r4, @ANYRES32=0x0, @ANYRESOCT, @ANYRES64], 0x0, 0x0, 0x820c01, 0x0) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 07:50:54 executing program 0: r0 = semget$private(0x0, 0x3, 0x400) semop(r0, 0x0, 0x1ad) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(0x0) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r5, 0x5424, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYRESOCT=r4, @ANYRES32=0x0, @ANYRESOCT, @ANYRES64], 0x0, 0x0, 0x820c01, 0x0) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 07:50:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0xa0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3a14}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'caif0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d067f2412d00000000e1801c65ab39ff5bf9e2f9d7c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") [ 1243.365180] kauditd_printk_skb: 154 callbacks suppressed [ 1243.365189] audit: type=1400 audit(1557215454.953:3363): avc: denied { map } for pid=2508 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.536027] audit: type=1400 audit(1557215454.993:3364): avc: denied { map } for pid=2508 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.729155] audit: type=1400 audit(1557215455.033:3365): avc: denied { map } for pid=2508 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:55 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) prctl$PR_SET_THP_DISABLE(0x29, 0x1) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000540)=""/229) 07:50:55 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) prctl$PR_SET_THP_DISABLE(0x29, 0x1) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000540)=""/229) [ 1243.932669] audit: type=1400 audit(1557215455.043:3366): avc: denied { map } for pid=2508 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1244.182606] audit: type=1400 audit(1557215455.073:3367): avc: denied { map } for pid=2509 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:56 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x72, 0x0, &(0x7f0000000040)) 07:50:56 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "17c0940f5ae8debe1f3739245f1ae501baeb640a28edbae329e9f0417ad3b7839c8111a278a980b03aceb95d95c1362653b3ae9c8d46bd5fd74f8612cec528", 0x3}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, 0x0, 0x0) [ 1244.513200] audit: type=1400 audit(1557215455.073:3368): avc: denied { map } for pid=2509 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1244.720431] audit: type=1400 audit(1557215455.093:3369): avc: denied { map } for pid=2509 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000bc0000000000000000000000ba0018000000c105e4af704a6d3c8dcdbd99133f335d8b0e6906aa8d076b29f1a2cd3e8c8cd2016182c53e0b2d438de689494ed4f56111d075fa1b84e861c7f37bf277618badf95c22de79baaa4f6cdfab666576fd9aec67a209979542e61d95f7d7948ed6319c7ca3bc07fe8f0f"], 0x7e}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") [ 1244.933403] audit: type=1400 audit(1557215455.103:3370): avc: denied { map } for pid=2509 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:50:56 executing program 1: syz_execute_func(&(0x7f0000000080)="264790cd8080000c6969ef69dc00d98a20d0d00fd1b02db5d900000070e4c653fb0fc4014c5868f4a95ff965be3c3bc4e17950ea01efc481925dc39d670f381d6a2f67450f483bd1d97c7c63460f576161787896c401fe5ff6a9c146000002e1b1b182010804f445e22c892a0f0000009f") [ 1245.203532] audit: type=1400 audit(1557215455.103:3371): avc: denied { map } for pid=2508 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1245.277662] audit: audit_backlog=65 > audit_backlog_limit=64 07:50:56 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_ADD(r0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 07:50:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20000002}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 07:50:57 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) prctl$PR_SET_THP_DISABLE(0x29, 0x1) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000540)=""/229) 07:50:57 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) prctl$PR_SET_THP_DISABLE(0x29, 0x1) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000540)=""/229) 07:50:57 executing program 1: syz_execute_func(&(0x7f0000000080)="264790cd8080000c6969ef69dc00d98a20d0d00fd1b02db5d900000070e4c653fb0fc4014c5868f4a95ff965be3c3bc4e17950ea01efc481925dc39d670f381d6a2f67450f483bd1d97c7c63460f576161787896c401fe5ff6a9c146000002e1b1b182010804f445e22c892a0f0000009f") 07:50:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000bc0000000000000000000000ba0018000000c105e4af704a6d3c8dcdbd99133f335d8b0e6906aa8d076b29f1a2cd3e8c8cd2016182c53e0b2d438de689494ed4f56111d075fa1b84e861c7f37bf277618badf95c22de79baaa4f6cdfab666576fd9aec67a209979542e61d95f7d7948ed6319c7ca3bc07fe8f0f"], 0x7e}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") 07:50:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) ppoll(0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}, 0x0, 0x0) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f0000000080)) 07:50:58 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/sockstat6\x00') clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000100)="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") 07:50:58 executing program 1: syz_execute_func(&(0x7f0000000080)="264790cd8080000c6969ef69dc00d98a20d0d00fd1b02db5d900000070e4c653fb0fc4014c5868f4a95ff965be3c3bc4e17950ea01efc481925dc39d670f381d6a2f67450f483bd1d97c7c63460f576161787896c401fe5ff6a9c146000002e1b1b182010804f445e22c892a0f0000009f") 07:50:58 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) prctl$PR_SET_THP_DISABLE(0x29, 0x1) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000540)=""/229) 07:50:58 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000080)=0x5, 0x6) prctl$PR_SET_THP_DISABLE(0x29, 0x1) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000540)=""/229) 07:50:59 executing program 1: syz_execute_func(&(0x7f0000000080)="264790cd8080000c6969ef69dc00d98a20d0d00fd1b02db5d900000070e4c653fb0fc4014c5868f4a95ff965be3c3bc4e17950ea01efc481925dc39d670f381d6a2f67450f483bd1d97c7c63460f576161787896c401fe5ff6a9c146000002e1b1b182010804f445e22c892a0f0000009f") 07:50:59 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/sockstat6\x00') clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000100)="994a2ae92c10964c0f05bf03000000c4a37bf0c50141e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 07:50:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) ppoll(0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}, 0x0, 0x0) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f0000000080)) 07:50:59 executing program 1: syz_execute_func(&(0x7f0000000180)="1c7fb5b598cd801b69e4c4c211af106962f5696200d9d9d0c42e17795bf9f9680c0000008fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01eff265dc5f00c35b5b45363ef80f9966030faee42c240f54635bdedec4a1e1e0ef26400f0d18c401fe5ff6e30fad4336660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d0000801d54111d00") 07:50:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000bc0000000000000000000000ba0018000000c105e4af704a6d3c8dcdbd99133f335d8b0e6906aa8d076b29f1a2cd3e8c8cd2016182c53e0b2d438de689494ed4f56111d075fa1b84e861c7f37bf277618badf95c22de79baaa4f6cdfab666576fd9aec67a209979542e61d95f7d7948ed6319c7ca3bc07fe8f0f"], 0x7e}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") 07:51:00 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="679e285d02dcef1d1791b930c25446a9bc882e", 0x13, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000340)={r0, 0x8, 0x5}, &(0x7f0000000440)=ANY=[@ANYBLOB="656263e558e5f920689f81554763726333326300000000000081000000000000000000fa320000001a00"], 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f00000000c0)=""/63) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f00000004c0)='./file0\x00', 0x800, 0x16) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240), 0x0) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3c, 0x0, &(0x7f0000003780)) syz_open_dev$usbmon(0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000380)={@local}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000000000000000000030000003000000010000000700000000000000fcffffffffffffff4000000000000000cb0000000000000000000000000000000000000000000000002000000000000000000000000000000600000000000000ff01000000000000ff0100000000000000000000000000000000000000000000010000000000000000000000000000000200000000000000000000000000000007000000000000000000000000000000000000000000000003100000000000000000000000000000b6010000000000000800000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000ff070000000000003f000000000000000000000000000000001000000000000080000000000000000000000000000000b6000000"]) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x0, 0x500}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000003c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 07:51:00 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) io_setup(0x100000001, &(0x7f0000000040)) [ 1248.988351] kauditd_printk_skb: 221 callbacks suppressed [ 1248.988360] audit: type=1400 audit(1557215460.573:3564): avc: denied { map } for pid=2611 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:00 executing program 1: syz_execute_func(&(0x7f0000000180)="1c7fb5b598cd801b69e4c4c211af106962f5696200d9d9d0c42e17795bf9f9680c0000008fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01eff265dc5f00c35b5b45363ef80f9966030faee42c240f54635bdedec4a1e1e0ef26400f0d18c401fe5ff6e30fad4336660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d0000801d54111d00") [ 1249.152709] audit: type=1400 audit(1557215460.573:3565): avc: denied { map } for pid=2611 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1249.284637] audit: type=1400 audit(1557215460.593:3566): avc: denied { map } for pid=2611 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="02000000bc0000000000000000000000ba0018000000c105e4af704a6d3c8dcdbd99133f335d8b0e6906aa8d076b29f1a2cd3e8c8cd2016182c53e0b2d438de689494ed4f56111d075fa1b84e861c7f37bf277618badf95c22de79baaa4f6cdfab666576fd9aec67a209979542e61d95f7d7948ed6319c7ca3bc07fe8f0f"], 0x7e}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0ccab5bf9e2f905c7c7e4c653fb0fc48f68b4a2319c3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6450f01eee47c7c730f66400f386033338f0f14e7e7c401fc52e95ff67de7baba0fe7af5cc34a51c441a5609c8ba80000005499") [ 1249.391051] audit: type=1400 audit(1557215460.593:3567): avc: denied { map } for pid=2611 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) ppoll(0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}, 0x0, 0x0) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f0000000080)) 07:51:01 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/sockstat6\x00') clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000100)="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") 07:51:01 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) io_setup(0x100000001, &(0x7f0000000040)) [ 1249.608571] audit: type=1400 audit(1557215460.633:3568): avc: denied { map } for pid=2606 comm="syz-executor.0" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=170935 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 07:51:01 executing program 1: syz_execute_func(&(0x7f0000000180)="1c7fb5b598cd801b69e4c4c211af106962f5696200d9d9d0c42e17795bf9f9680c0000008fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01eff265dc5f00c35b5b45363ef80f9966030faee42c240f54635bdedec4a1e1e0ef26400f0d18c401fe5ff6e30fad4336660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d0000801d54111d00") [ 1249.766861] audit: type=1400 audit(1557215460.633:3569): avc: denied { map } for pid=2611 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:01 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="679e285d02dcef1d1791b930c25446a9bc882e", 0x13, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000340)={r0, 0x8, 0x5}, &(0x7f0000000440)=ANY=[@ANYBLOB="656263e558e5f920689f81554763726333326300000000000081000000000000000000fa320000001a00"], 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f00000000c0)=""/63) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f00000004c0)='./file0\x00', 0x800, 0x16) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240), 0x0) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3c, 0x0, &(0x7f0000003780)) syz_open_dev$usbmon(0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000380)={@local}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000000000000000000030000003000000010000000700000000000000fcffffffffffffff4000000000000000cb0000000000000000000000000000000000000000000000002000000000000000000000000000000600000000000000ff01000000000000ff0100000000000000000000000000000000000000000000010000000000000000000000000000000200000000000000000000000000000007000000000000000000000000000000000000000000000003100000000000000000000000000000b6010000000000000800000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000ff070000000000003f000000000000000000000000000000001000000000000080000000000000000000000000000000b6000000"]) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x0, 0x500}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000003c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1249.930445] audit: type=1400 audit(1557215460.683:3570): avc: denied { map } for pid=2611 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1250.066100] audit: type=1400 audit(1557215460.693:3571): avc: denied { map } for pid=2611 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:01 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) io_setup(0x100000001, &(0x7f0000000040)) [ 1250.277212] audit: type=1400 audit(1557215460.723:3572): avc: denied { map } for pid=2611 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:01 executing program 1: syz_execute_func(&(0x7f0000000180)="1c7fb5b598cd801b69e4c4c211af106962f5696200d9d9d0c42e17795bf9f9680c0000008fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01eff265dc5f00c35b5b45363ef80f9966030faee42c240f54635bdedec4a1e1e0ef26400f0d18c401fe5ff6e30fad4336660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d0000801d54111d00") [ 1250.441597] audit: type=1400 audit(1557215460.723:3573): avc: denied { map } for pid=2611 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) ppoll(0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}, 0x0, 0x0) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f0000000080)) 07:51:02 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) io_setup(0x100000001, &(0x7f0000000040)) 07:51:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)="ef24354870", 0x5}], 0x1, 0x0) syz_execute_func(&(0x7f00000003c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f480817eebce000008020080063fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833448dbd448dbd14e7e701fe5ff6e7df660fe7af5cc34a510804f4c401f882609c8b42a8002d00002d00") 07:51:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2590f0124eda173fa20f7c187f9001842dc6180d0c4ab5be2f93e3667f26cc40199592b420ff19200000000660f382a1e04c4a1a9d99259a10000e5564808eebce00000802000f3f047018a00000020f04b0d8fc74c4d242447dff57c330f64400bc4637916226326660f3a09b517ef0000ab6e3e66450fe11500000000408fe3e3671578432d2d10c1000000d16441d3ee0f956667d2ab05000000323636209fe15b070000000000") 07:51:02 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="679e285d02dcef1d1791b930c25446a9bc882e", 0x13, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000340)={r0, 0x8, 0x5}, &(0x7f0000000440)=ANY=[@ANYBLOB="656263e558e5f920689f81554763726333326300000000000081000000000000000000fa320000001a00"], 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f00000000c0)=""/63) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f00000004c0)='./file0\x00', 0x800, 0x16) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240), 0x0) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3c, 0x0, &(0x7f0000003780)) syz_open_dev$usbmon(0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000380)={@local}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000000000000000000030000003000000010000000700000000000000fcffffffffffffff4000000000000000cb0000000000000000000000000000000000000000000000002000000000000000000000000000000600000000000000ff01000000000000ff0100000000000000000000000000000000000000000000010000000000000000000000000000000200000000000000000000000000000007000000000000000000000000000000000000000000000003100000000000000000000000000000b6010000000000000800000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000ff070000000000003f000000000000000000000000000000001000000000000080000000000000000000000000000000b6000000"]) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x0, 0x500}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000003c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 07:51:02 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/sockstat6\x00') clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000100)="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") 07:51:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000300)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) socketpair(0x12, 0x0, 0x40, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400, 0x0) readv(r1, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) socket$unix(0x1, 0x3, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 07:51:03 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="c10300000000ffffff841fe4ac141417e0", 0x11}], 0x1}, 0x0) 07:51:03 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)) dup2(r0, r1) 07:51:03 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="679e285d02dcef1d1791b930c25446a9bc882e", 0x13, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000340)={r0, 0x8, 0x5}, &(0x7f0000000440)=ANY=[@ANYBLOB="656263e558e5f920689f81554763726333326300000000000081000000000000000000fa320000001a00"], 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f00000000c0)=""/63) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f00000004c0)='./file0\x00', 0x800, 0x16) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240), 0x0) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3c, 0x0, &(0x7f0000003780)) syz_open_dev$usbmon(0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000380)={@local}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000000000000000000030000003000000010000000700000000000000fcffffffffffffff4000000000000000cb0000000000000000000000000000000000000000000000002000000000000000000000000000000600000000000000ff01000000000000ff0100000000000000000000000000000000000000000000010000000000000000000000000000000200000000000000000000000000000007000000000000000000000000000000000000000000000003100000000000000000000000000000b6010000000000000800000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000ff070000000000003f000000000000000000000000000000001000000000000080000000000000000000000000000000b6000000"]) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x0, 0x500}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000003c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 07:51:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)="ef24354870", 0x5}], 0x1, 0x0) syz_execute_func(&(0x7f00000003c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f480817eebce000008020080063fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833448dbd448dbd14e7e701fe5ff6e7df660fe7af5cc34a510804f4c401f882609c8b42a8002d00002d00") 07:51:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@nat={'nath\x02\x00', 0x19, 0x2, 0x268, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'ip6gre0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'veth1_to_bridge\x00', @remote, [], @remote, [], 0xb0, 0xb0, 0xe8, [@mark_m={'mark_m\x00', 0x18, {{0x0, 0x0, 0x0, 0x2}}}]}}, @snat={'snat\x00', 0x10, {{@broadcast}}}}, {{{0x15, 0x0, 0x0, 'ip_vti0\x00', 'syz_tun\x00', 'sit0\x00', 'bond0\x00', @remote, [], @local, [], 0xc0, 0xc0, 0xf0, [@helper={'helper\x00', 0x28, {{0x0, 'RAS\x00'}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2e0) 07:51:04 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)) dup2(r0, r1) 07:51:04 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)) dup2(r0, r1) 07:51:04 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)) dup2(r0, r1) [ 1253.361352] x_tables: eb_tables: snat target: only valid in nat table, not nath 07:51:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@nat={'nath\x02\x00', 0x19, 0x2, 0x268, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'ip6gre0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'veth1_to_bridge\x00', @remote, [], @remote, [], 0xb0, 0xb0, 0xe8, [@mark_m={'mark_m\x00', 0x18, {{0x0, 0x0, 0x0, 0x2}}}]}}, @snat={'snat\x00', 0x10, {{@broadcast}}}}, {{{0x15, 0x0, 0x0, 'ip_vti0\x00', 'syz_tun\x00', 'sit0\x00', 'bond0\x00', @remote, [], @local, [], 0xc0, 0xc0, 0xf0, [@helper={'helper\x00', 0x28, {{0x0, 'RAS\x00'}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2e0) 07:51:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16], 0x2}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00003680") 07:51:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)="ef24354870", 0x5}], 0x1, 0x0) syz_execute_func(&(0x7f00000003c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f480817eebce000008020080063fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833448dbd448dbd14e7e701fe5ff6e7df660fe7af5cc34a510804f4c401f882609c8b42a8002d00002d00") [ 1254.024758] kauditd_printk_skb: 236 callbacks suppressed [ 1254.024767] audit: type=1400 audit(1557215465.603:3798): avc: denied { map } for pid=2714 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1254.233581] audit: type=1400 audit(1557215465.643:3799): avc: denied { map } for pid=2714 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1254.310867] x_tables: eb_tables: snat target: only valid in nat table, not nath 07:51:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@nat={'nath\x02\x00', 0x19, 0x2, 0x268, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'ip6gre0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'veth1_to_bridge\x00', @remote, [], @remote, [], 0xb0, 0xb0, 0xe8, [@mark_m={'mark_m\x00', 0x18, {{0x0, 0x0, 0x0, 0x2}}}]}}, @snat={'snat\x00', 0x10, {{@broadcast}}}}, {{{0x15, 0x0, 0x0, 'ip_vti0\x00', 'syz_tun\x00', 'sit0\x00', 'bond0\x00', @remote, [], @local, [], 0xc0, 0xc0, 0xf0, [@helper={'helper\x00', 0x28, {{0x0, 'RAS\x00'}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2e0) 07:51:06 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)) dup2(r0, r1) [ 1254.461838] audit: type=1400 audit(1557215465.653:3800): avc: denied { map } for pid=2720 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:06 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)) dup2(r0, r1) [ 1254.607697] audit: type=1400 audit(1557215465.673:3801): avc: denied { map } for pid=2720 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1254.734612] audit: type=1400 audit(1557215465.693:3802): avc: denied { map } for pid=2720 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:06 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)) dup2(r0, r1) [ 1254.890078] audit: type=1400 audit(1557215465.703:3803): avc: denied { map } for pid=2720 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1255.025937] audit: type=1400 audit(1557215465.743:3804): avc: denied { map } for pid=2720 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1255.151044] x_tables: eb_tables: snat target: only valid in nat table, not nath [ 1255.167804] audit: type=1400 audit(1557215465.773:3805): avc: denied { map } for pid=2720 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@nat={'nath\x02\x00', 0x19, 0x2, 0x268, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'ip6gre0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'veth1_to_bridge\x00', @remote, [], @remote, [], 0xb0, 0xb0, 0xe8, [@mark_m={'mark_m\x00', 0x18, {{0x0, 0x0, 0x0, 0x2}}}]}}, @snat={'snat\x00', 0x10, {{@broadcast}}}}, {{{0x15, 0x0, 0x0, 'ip_vti0\x00', 'syz_tun\x00', 'sit0\x00', 'bond0\x00', @remote, [], @local, [], 0xc0, 0xc0, 0xf0, [@helper={'helper\x00', 0x28, {{0x0, 'RAS\x00'}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2e0) [ 1255.344092] audit: type=1400 audit(1557215465.803:3806): avc: denied { map } for pid=2720 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16], 0x2}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00003680") 07:51:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000100)="ef24354870", 0x5}], 0x1, 0x0) syz_execute_func(&(0x7f00000003c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f480817eebce000008020080063fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833448dbd448dbd14e7e701fe5ff6e7df660fe7af5cc34a510804f4c401f882609c8b42a8002d00002d00") [ 1255.542332] audit: type=1400 audit(1557215465.863:3807): avc: denied { map } for pid=2720 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1256.029368] x_tables: eb_tables: snat target: only valid in nat table, not nath 07:51:07 executing program 1: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={&(0x7f00000001c0)={'sha1-ssse3\x00'}}) 07:51:08 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)) dup2(r0, r1) 07:51:08 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)) dup2(r0, r1) 07:51:08 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)) dup2(r0, r1) 07:51:08 executing program 1: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={&(0x7f00000001c0)={'sha1-ssse3\x00'}}) 07:51:08 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aec44201461f41730fc4223997d48f0f14e78fc403850fd5fe0fe7af5cc34a510804f4c441a5609c8ba800000099") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) 07:51:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16], 0x2}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00003680") 07:51:09 executing program 1: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={&(0x7f00000001c0)={'sha1-ssse3\x00'}}) 07:51:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) 07:51:10 executing program 1: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={&(0x7f00000001c0)={'sha1-ssse3\x00'}}) 07:51:10 executing program 4: keyctl$update(0x2, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) syz_genetlink_get_family_id$nbd(0x0) dup(0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100), 0x1, 0x0) r3 = dup(r2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', 'syz'}, &(0x7f0000000300)='syz', 0x3, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffb) 07:51:10 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aec44201461f41730fc4223997d48f0f14e78fc403850fd5fe0fe7af5cc34a510804f4c441a5609c8ba800000099") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) 07:51:10 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aec44201461f41730fc4223997d48f0f14e78fc403850fd5fe0fe7af5cc34a510804f4c441a5609c8ba800000099") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) 07:51:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16], 0x2}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00003680") 07:51:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) [ 1259.055897] kauditd_printk_skb: 166 callbacks suppressed [ 1259.055906] audit: type=1400 audit(1557215470.613:3974): avc: denied { read } for pid=2808 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1259.296138] audit: type=1400 audit(1557215470.653:3975): avc: denied { map } for pid=2815 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1259.498286] audit: type=1400 audit(1557215470.723:3976): avc: denied { map } for pid=2815 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1259.734912] audit: type=1400 audit(1557215470.743:3977): avc: denied { map } for pid=2815 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:11 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chmod(&(0x7f00000000c0)='./bus\x00', 0x1) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="00002f9c54e71f3be48a2b6e05a7de114f3834df2210"], 0x16) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 07:51:11 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aec44201461f41730fc4223997d48f0f14e78fc403850fd5fe0fe7af5cc34a510804f4c441a5609c8ba800000099") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) [ 1259.933607] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1259.952449] audit: audit_lost=164 audit_rate_limit=0 audit_backlog_limit=64 [ 1259.998235] audit: type=1400 audit(1557215470.763:3978): avc: denied { create } for pid=2816 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 07:51:11 executing program 4: keyctl$update(0x2, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) syz_genetlink_get_family_id$nbd(0x0) dup(0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100), 0x1, 0x0) r3 = dup(r2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', 'syz'}, &(0x7f0000000300)='syz', 0x3, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffb) [ 1260.073613] audit: backlog limit exceeded [ 1260.136901] audit: audit_backlog=65 > audit_backlog_limit=64 07:51:11 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aec44201461f41730fc4223997d48f0f14e78fc403850fd5fe0fe7af5cc34a510804f4c441a5609c8ba800000099") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) [ 1260.224306] audit: audit_lost=165 audit_rate_limit=0 audit_backlog_limit=64 07:51:12 executing program 5: keyctl$update(0x2, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) syz_genetlink_get_family_id$nbd(0x0) dup(0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100), 0x1, 0x0) r3 = dup(r2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', 'syz'}, &(0x7f0000000300)='syz', 0x3, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffb) 07:51:12 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:51:13 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aec44201461f41730fc4223997d48f0f14e78fc403850fd5fe0fe7af5cc34a510804f4c441a5609c8ba800000099") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) 07:51:13 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aec44201461f41730fc4223997d48f0f14e78fc403850fd5fe0fe7af5cc34a510804f4c441a5609c8ba800000099") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) 07:51:13 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:51:13 executing program 5: keyctl$update(0x2, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) syz_genetlink_get_family_id$nbd(0x0) dup(0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100), 0x1, 0x0) r3 = dup(r2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', 'syz'}, &(0x7f0000000300)='syz', 0x3, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffb) 07:51:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) 07:51:14 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:51:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x150, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xe}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2c0}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xdb}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_team\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x14, 0x2, @in={0x2, 0x0, @local}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4}, 0x4000000000000000) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") 07:51:15 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.pro/s\x00', 0x2, 0x0) 07:51:15 executing program 4: keyctl$update(0x2, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) syz_genetlink_get_family_id$nbd(0x0) dup(0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100), 0x1, 0x0) r3 = dup(r2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', 'syz'}, &(0x7f0000000300)='syz', 0x3, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffb) 07:51:15 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1264.068149] kauditd_printk_skb: 221 callbacks suppressed [ 1264.068158] audit: type=1400 audit(1557215475.653:4199): avc: denied { map } for pid=2928 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:15 executing program 5: keyctl$update(0x2, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) syz_genetlink_get_family_id$nbd(0x0) dup(0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100), 0x1, 0x0) r3 = dup(r2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', 'syz'}, &(0x7f0000000300)='syz', 0x3, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffb) [ 1264.314436] audit: type=1400 audit(1557215475.653:4200): avc: denied { map } for pid=2928 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:16 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.pro/s\x00', 0x2, 0x0) [ 1264.526704] audit: type=1400 audit(1557215475.703:4201): avc: denied { map } for pid=2928 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1264.718603] audit: type=1400 audit(1557215475.753:4202): avc: denied { map } for pid=2928 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x600081) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x1001c) sendfile(r1, r2, 0x0, 0x8000fffffffb) [ 1264.930121] audit: type=1400 audit(1557215475.763:4203): avc: denied { map } for pid=2928 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x150, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xe}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2c0}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xdb}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_team\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x14, 0x2, @in={0x2, 0x0, @local}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4}, 0x4000000000000000) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") [ 1265.109332] audit: type=1400 audit(1557215475.813:4204): avc: denied { map } for pid=2928 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1265.331390] audit: type=1400 audit(1557215475.823:4205): avc: denied { map } for pid=2932 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1265.535309] audit: type=1400 audit(1557215475.833:4206): avc: denied { map } for pid=2928 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:17 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.pro/s\x00', 0x2, 0x0) [ 1265.732783] audit: type=1400 audit(1557215475.843:4207): avc: denied { map } for pid=2932 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1265.779570] audit: audit_backlog=65 > audit_backlog_limit=64 07:51:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) 07:51:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x600081) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x1001c) sendfile(r1, r2, 0x0, 0x8000fffffffb) 07:51:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x600081) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x1001c) sendfile(r1, r2, 0x0, 0x8000fffffffb) 07:51:18 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.pro/s\x00', 0x2, 0x0) 07:51:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x150, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xe}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2c0}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xdb}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_team\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x14, 0x2, @in={0x2, 0x0, @local}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4}, 0x4000000000000000) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") 07:51:18 executing program 4: keyctl$update(0x2, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) syz_genetlink_get_family_id$nbd(0x0) dup(0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100), 0x1, 0x0) r3 = dup(r2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', 'syz'}, &(0x7f0000000300)='syz', 0x3, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffb) 07:51:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x600081) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x1001c) sendfile(r1, r2, 0x0, 0x8000fffffffb) 07:51:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x600081) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x1001c) sendfile(r1, r2, 0x0, 0x8000fffffffb) 07:51:19 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02b64c0f05bf06000000c4a37bf0c5e041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) 07:51:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x600081) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x1001c) sendfile(r1, r2, 0x0, 0x8000fffffffb) 07:51:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x600081) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x1001c) sendfile(r1, r2, 0x0, 0x8000fffffffb) 07:51:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x150, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xe}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2c0}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xdb}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_team\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x14, 0x2, @in={0x2, 0x0, @local}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4}, 0x4000000000000000) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b955f420f383c02c401405c6bfdd70fc7f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa5b3609c0f01c4288ba6452e00005480") [ 1269.081634] kauditd_printk_skb: 193 callbacks suppressed [ 1269.081643] audit: type=1400 audit(1557215480.673:4387): avc: denied { map } for pid=3026 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1269.313313] audit: type=1400 audit(1557215480.783:4388): avc: denied { map } for pid=3026 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1269.433713] audit: type=1400 audit(1557215480.833:4389): avc: denied { map } for pid=3026 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1269.549265] audit: type=1400 audit(1557215480.863:4390): avc: denied { map } for pid=3026 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1269.674887] audit: type=1400 audit(1557215480.903:4391): avc: denied { map } for pid=3026 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) 07:51:21 executing program 5: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xbe2) r3 = getpid() fcntl$setown(r1, 0x8, r3) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_UIE_OFF(r0, 0x7004) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) unshare(0x40000000) 07:51:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) shutdown(r0, 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c}, 0x1c}}, 0x4000) sendto$inet6(r0, 0x0, 0x0, 0x4000, 0x0, 0x0) 07:51:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00030000000000000067681bfd070000004c00000000fb6c7a2ce2"}, 0x4a) 07:51:21 executing program 4: sendto$unix(0xffffffffffffffff, &(0x7f0000000100)="14628a14698e7d6bbe", 0x9, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") [ 1269.790569] audit: type=1400 audit(1557215480.933:4392): avc: denied { map } for pid=3026 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0)=[{&(0x7f00000004c0)="a9358517e640124153e2cffa928666cee9f798d9e0cca6427e6ba7bc0c1299b7298e03fc722aa139c8ad5df94a7711f703683295677f0d7a9049ddcf62a68c905ff7be0cb323766040ebfe5dac21ec393fd5951e8d6d688b52e8a4e071f6afb401a5f6b4c704d144a6caa0d9d6e36227e6b27ededdceee956e092a4c48a58e828d6aa676652a322dd5b4d33c9b774b8839dc82ec99fb0fb9b8cf201a5bb18db2963371b23700ae92b41cc93a019a5a13cb719aa98d275c45189c4bc88de1", 0xbe}], 0x1, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1269.957801] audit: type=1400 audit(1557215480.943:4393): avc: denied { map } for pid=3029 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) shutdown(r0, 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c}, 0x1c}}, 0x4000) sendto$inet6(r0, 0x0, 0x0, 0x4000, 0x0, 0x0) [ 1269.998975] SELinux: failed to load policy [ 1270.068793] SELinux: failed to load policy 07:51:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00030000000000000067681bfd070000004c00000000fb6c7a2ce2"}, 0x4a) [ 1270.127259] audit: type=1400 audit(1557215480.943:4394): avc: denied { map } for pid=3029 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1270.285000] audit: type=1400 audit(1557215480.943:4395): avc: denied { map } for pid=3029 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1270.476172] audit: type=1400 audit(1557215480.943:4396): avc: denied { map } for pid=3029 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:22 executing program 4: sendto$unix(0xffffffffffffffff, &(0x7f0000000100)="14628a14698e7d6bbe", 0x9, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 07:51:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) shutdown(r0, 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c}, 0x1c}}, 0x4000) sendto$inet6(r0, 0x0, 0x0, 0x4000, 0x0, 0x0) [ 1270.911175] SELinux: failed to load policy 07:51:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00030000000000000067681bfd070000004c00000000fb6c7a2ce2"}, 0x4a) [ 1271.250330] IPVS: ftp: loaded support on port[0] = 21 07:51:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0)=[{&(0x7f00000004c0)="a9358517e640124153e2cffa928666cee9f798d9e0cca6427e6ba7bc0c1299b7298e03fc722aa139c8ad5df94a7711f703683295677f0d7a9049ddcf62a68c905ff7be0cb323766040ebfe5dac21ec393fd5951e8d6d688b52e8a4e071f6afb401a5f6b4c704d144a6caa0d9d6e36227e6b27ededdceee956e092a4c48a58e828d6aa676652a322dd5b4d33c9b774b8839dc82ec99fb0fb9b8cf201a5bb18db2963371b23700ae92b41cc93a019a5a13cb719aa98d275c45189c4bc88de1", 0xbe}], 0x1, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1271.493599] SELinux: failed to load policy 07:51:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00030000000000000067681bfd070000004c00000000fb6c7a2ce2"}, 0x4a) 07:51:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0)=[{&(0x7f00000004c0)="a9358517e640124153e2cffa928666cee9f798d9e0cca6427e6ba7bc0c1299b7298e03fc722aa139c8ad5df94a7711f703683295677f0d7a9049ddcf62a68c905ff7be0cb323766040ebfe5dac21ec393fd5951e8d6d688b52e8a4e071f6afb401a5f6b4c704d144a6caa0d9d6e36227e6b27ededdceee956e092a4c48a58e828d6aa676652a322dd5b4d33c9b774b8839dc82ec99fb0fb9b8cf201a5bb18db2963371b23700ae92b41cc93a019a5a13cb719aa98d275c45189c4bc88de1", 0xbe}], 0x1, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:51:24 executing program 5: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xbe2) r3 = getpid() fcntl$setown(r1, 0x8, r3) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_UIE_OFF(r0, 0x7004) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) unshare(0x40000000) 07:51:24 executing program 4: sendto$unix(0xffffffffffffffff, &(0x7f0000000100)="14628a14698e7d6bbe", 0x9, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 07:51:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) shutdown(r0, 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c}, 0x1c}}, 0x4000) sendto$inet6(r0, 0x0, 0x0, 0x4000, 0x0, 0x0) [ 1272.914975] SELinux: failed to load policy 07:51:24 executing program 1: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xbe2) r3 = getpid() fcntl$setown(r1, 0x8, r3) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_UIE_OFF(r0, 0x7004) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) unshare(0x40000000) 07:51:24 executing program 3: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xbe2) r3 = getpid() fcntl$setown(r1, 0x8, r3) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_UIE_OFF(r0, 0x7004) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) unshare(0x40000000) 07:51:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) shutdown(r0, 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c}, 0x1c}}, 0x4000) sendto$inet6(r0, 0x0, 0x0, 0x4000, 0x0, 0x0) 07:51:25 executing program 5: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xbe2) r3 = getpid() fcntl$setown(r1, 0x8, r3) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_UIE_OFF(r0, 0x7004) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) unshare(0x40000000) 07:51:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) shutdown(r0, 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c}, 0x1c}}, 0x4000) sendto$inet6(r0, 0x0, 0x0, 0x4000, 0x0, 0x0) 07:51:25 executing program 4: sendto$unix(0xffffffffffffffff, &(0x7f0000000100)="14628a14698e7d6bbe", 0x9, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 07:51:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000001c0)=[{&(0x7f00000004c0)="a9358517e640124153e2cffa928666cee9f798d9e0cca6427e6ba7bc0c1299b7298e03fc722aa139c8ad5df94a7711f703683295677f0d7a9049ddcf62a68c905ff7be0cb323766040ebfe5dac21ec393fd5951e8d6d688b52e8a4e071f6afb401a5f6b4c704d144a6caa0d9d6e36227e6b27ededdceee956e092a4c48a58e828d6aa676652a322dd5b4d33c9b774b8839dc82ec99fb0fb9b8cf201a5bb18db2963371b23700ae92b41cc93a019a5a13cb719aa98d275c45189c4bc88de1", 0xbe}], 0x1, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:51:25 executing program 1: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xbe2) r3 = getpid() fcntl$setown(r1, 0x8, r3) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_UIE_OFF(r0, 0x7004) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) unshare(0x40000000) [ 1274.291157] kauditd_printk_skb: 173 callbacks suppressed [ 1274.291165] audit: type=1400 audit(1557215485.873:4570): avc: denied { map } for pid=3106 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1274.472818] audit: type=1400 audit(1557215485.923:4571): avc: denied { map } for pid=3106 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) shutdown(r0, 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c}, 0x1c}}, 0x4000) sendto$inet6(r0, 0x0, 0x0, 0x4000, 0x0, 0x0) 07:51:26 executing program 3: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xbe2) r3 = getpid() fcntl$setown(r1, 0x8, r3) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_UIE_OFF(r0, 0x7004) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) unshare(0x40000000) [ 1274.688441] audit: type=1400 audit(1557215485.923:4572): avc: denied { map } for pid=3106 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1274.876753] audit: type=1400 audit(1557215485.923:4573): avc: denied { map } for pid=3106 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1275.100119] audit: type=1400 audit(1557215486.023:4574): avc: denied { map } for pid=3106 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:26 executing program 5: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xbe2) r3 = getpid() fcntl$setown(r1, 0x8, r3) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_UIE_OFF(r0, 0x7004) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) unshare(0x40000000) [ 1275.250767] audit: type=1400 audit(1557215486.063:4575): avc: denied { map } for pid=3113 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:27 executing program 4: setrlimit(0x400000000000007, &(0x7f0000000000)) fanotify_init(0x0, 0x0) [ 1275.416775] audit: type=1400 audit(1557215486.063:4576): avc: denied { map } for pid=3113 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="0c3ab5b598cd801b6969ef69dc00d9d9d0c44139fd5bf91cc18fe9589b26c7e4c753fbc4e101f6fe58c4427d135200c4413bf2168f4808eebce00000802000c421fc8fe9509b9200ed2e00c1ea01f265dc5f00c366450f1867466566460feea8eb6d5fcf26176c24a1a1460f569f0000000026400f0d18c4c15dfb9313d20000e3df64fc6736676666430fefb3000000000004f46666450f17720d14111d54111d00") 07:51:27 executing program 1: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xbe2) r3 = getpid() fcntl$setown(r1, 0x8, r3) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_UIE_OFF(r0, 0x7004) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) unshare(0x40000000) [ 1275.630352] audit: type=1400 audit(1557215486.093:4577): avc: denied { map } for pid=3106 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:27 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x125802, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000003c0)="984a2ae92c0b964c0f05bf00000020c4a37bf0c5bf41e2e9c422e9aabb3c00000064f3460f1b2800000f383a9e02000000110f4e5bc4a265aa104b2636a00f38091e2fa2631bc421045f4607e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efc44149e85c4d31459d6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc402712f358f0000000f9f3c6436b266450fc4650000c4e39978c104d9a1e8719e70ddcdcda21a383468004c48e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca5536f347aab03a6208cf") [ 1275.811909] audit: type=1400 audit(1557215486.093:4578): avc: denied { map } for pid=3106 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:27 executing program 3: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xbe2) r3 = getpid() fcntl$setown(r1, 0x8, r3) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_UIE_OFF(r0, 0x7004) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) unshare(0x40000000) [ 1275.969820] audit: audit_backlog=65 > audit_backlog_limit=64 07:51:27 executing program 4: setrlimit(0x400000000000007, &(0x7f0000000000)) fanotify_init(0x0, 0x0) 07:51:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="0c3ab5b598cd801b6969ef69dc00d9d9d0c44139fd5bf91cc18fe9589b26c7e4c753fbc4e101f6fe58c4427d135200c4413bf2168f4808eebce00000802000c421fc8fe9509b9200ed2e00c1ea01f265dc5f00c366450f1867466566460feea8eb6d5fcf26176c24a1a1460f569f0000000026400f0d18c4c15dfb9313d20000e3df64fc6736676666430fefb3000000000004f46666450f17720d14111d54111d00") 07:51:28 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x125802, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000003c0)="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") 07:51:28 executing program 4: setrlimit(0x400000000000007, &(0x7f0000000000)) fanotify_init(0x0, 0x0) 07:51:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="0c3ab5b598cd801b6969ef69dc00d9d9d0c44139fd5bf91cc18fe9589b26c7e4c753fbc4e101f6fe58c4427d135200c4413bf2168f4808eebce00000802000c421fc8fe9509b9200ed2e00c1ea01f265dc5f00c366450f1867466566460feea8eb6d5fcf26176c24a1a1460f569f0000000026400f0d18c4c15dfb9313d20000e3df64fc6736676666430fefb3000000000004f46666450f17720d14111d54111d00") 07:51:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10004}, 0xc, 0x0}, 0x0) 07:51:28 executing program 1: add_key(0x0, 0x0, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffc) r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x9, &(0x7f00000001c0)=""/214, &(0x7f00000000c0)=0xd6) 07:51:29 executing program 4: setrlimit(0x400000000000007, &(0x7f0000000000)) fanotify_init(0x0, 0x0) 07:51:29 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="ff100000000023e85e37edfbb59e1e1ad6649b5521031b54bfb0141c7583aea02bbdf12d8b407ee82dc3248dd78f3a63ceef3f288d89b178c77ea5f71ee0a0d5947df76a49a3a8c8a9610400000003b925bd3f6419f24555de"], 0x59) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000001) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) creat(&(0x7f00000003c0)='./file1\x00', 0x0) 07:51:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="0c3ab5b598cd801b6969ef69dc00d9d9d0c44139fd5bf91cc18fe9589b26c7e4c753fbc4e101f6fe58c4427d135200c4413bf2168f4808eebce00000802000c421fc8fe9509b9200ed2e00c1ea01f265dc5f00c366450f1867466566460feea8eb6d5fcf26176c24a1a1460f569f0000000026400f0d18c4c15dfb9313d20000e3df64fc6736676666430fefb3000000000004f46666450f17720d14111d54111d00") 07:51:29 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x125802, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000003c0)="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") 07:51:29 executing program 4: open$dir(&(0x7f0000000000)='./bus/file0\x00', 0x20000, 0x40) r0 = socket$inet6(0xa, 0x801, 0x0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x7ffff, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x21c, 0x0, 0x0, 0x0, 0xf42f, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff83, 0xa, 0x0, 0x0, 0x0, 0x8906, 0xf0ffffffffffff}}}}}, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$packet_int(r3, 0x107, 0x3, &(0x7f0000000100)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) 07:51:29 executing program 1: add_key(0x0, 0x0, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffc) r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x9, &(0x7f00000001c0)=""/214, &(0x7f00000000c0)=0xd6) 07:51:30 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x102000000001d, 0x100}, 0x8) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) close(r0) [ 1278.950326] protocol 88fb is buggy, dev hsr_slave_0 07:51:30 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x125802, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000003c0)="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") 07:51:30 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="ff100000000023e85e37edfbb59e1e1ad6649b5521031b54bfb0141c7583aea02bbdf12d8b407ee82dc3248dd78f3a63ceef3f288d89b178c77ea5f71ee0a0d5947df76a49a3a8c8a9610400000003b925bd3f6419f24555de"], 0x59) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000001) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) creat(&(0x7f00000003c0)='./file1\x00', 0x0) 07:51:30 executing program 1: add_key(0x0, 0x0, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffc) r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x9, &(0x7f00000001c0)=""/214, &(0x7f00000000c0)=0xd6) [ 1279.548199] kauditd_printk_skb: 201 callbacks suppressed [ 1279.548208] audit: type=1400 audit(1557215491.133:4778): avc: denied { map } for pid=3203 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1279.714732] audit: type=1400 audit(1557215491.173:4779): avc: denied { map } for pid=3203 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10004}, 0xc, 0x0}, 0x0) 07:51:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(&(0x7f0000000b40)={0x20080522}, &(0x7f0000000b80)) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 07:51:31 executing program 0: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="ff100000000023e85e37edfbb59e1e1ad6649b5521031b54bfb0141c7583aea02bbdf12d8b407ee82dc3248dd78f3a63ceef3f288d89b178c77ea5f71ee0a0d5947df76a49a3a8c8a9610400000003b925bd3f6419f24555de"], 0x59) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000001) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) creat(&(0x7f00000003c0)='./file1\x00', 0x0) [ 1279.924666] audit: type=1400 audit(1557215491.193:4780): avc: denied { map } for pid=3203 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:31 executing program 1: add_key(0x0, 0x0, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffc) r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x9, &(0x7f00000001c0)=""/214, &(0x7f00000000c0)=0xd6) 07:51:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) readv(r1, &(0x7f0000001780)=[{0x0}, {&(0x7f0000000600)=""/188, 0xbc}, {0x0}], 0x3) r2 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r2, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) [ 1280.110880] audit: type=1400 audit(1557215491.203:4781): avc: denied { map } for pid=3203 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(&(0x7f0000000b40)={0x20080522}, &(0x7f0000000b80)) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 1280.445785] audit: type=1400 audit(1557215491.243:4782): avc: denied { map } for pid=3203 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:32 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="ff100000000023e85e37edfbb59e1e1ad6649b5521031b54bfb0141c7583aea02bbdf12d8b407ee82dc3248dd78f3a63ceef3f288d89b178c77ea5f71ee0a0d5947df76a49a3a8c8a9610400000003b925bd3f6419f24555de"], 0x59) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000001) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) creat(&(0x7f00000003c0)='./file1\x00', 0x0) [ 1280.721841] audit: type=1400 audit(1557215491.293:4783): avc: denied { map } for pid=3203 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1280.946983] audit: type=1400 audit(1557215491.323:4784): avc: denied { map } for pid=3203 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0xc8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe875}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5456}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_NODE={0x4}]}, 0xc8}, 0x1, 0x0, 0x0, 0x400000000}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:51:32 executing program 0: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="ff100000000023e85e37edfbb59e1e1ad6649b5521031b54bfb0141c7583aea02bbdf12d8b407ee82dc3248dd78f3a63ceef3f288d89b178c77ea5f71ee0a0d5947df76a49a3a8c8a9610400000003b925bd3f6419f24555de"], 0x59) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000001) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) creat(&(0x7f00000003c0)='./file1\x00', 0x0) [ 1281.207781] audit: type=1400 audit(1557215491.353:4785): avc: denied { map } for pid=3203 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1281.233533] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1281.240121] audit: audit_backlog=65 > audit_backlog_limit=64 07:51:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(&(0x7f0000000b40)={0x20080522}, &(0x7f0000000b80)) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 07:51:33 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) close(r0) fcntl$dupfd(r1, 0x0, r0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) 07:51:34 executing program 3: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="ff100000000023e85e37edfbb59e1e1ad6649b5521031b54bfb0141c7583aea02bbdf12d8b407ee82dc3248dd78f3a63ceef3f288d89b178c77ea5f71ee0a0d5947df76a49a3a8c8a9610400000003b925bd3f6419f24555de"], 0x59) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000001) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) creat(&(0x7f00000003c0)='./file1\x00', 0x0) 07:51:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10004}, 0xc, 0x0}, 0x0) 07:51:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(&(0x7f0000000b40)={0x20080522}, &(0x7f0000000b80)) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 07:51:34 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) close(r0) fcntl$dupfd(r1, 0x0, r0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) 07:51:34 executing program 0: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="ff100000000023e85e37edfbb59e1e1ad6649b5521031b54bfb0141c7583aea02bbdf12d8b407ee82dc3248dd78f3a63ceef3f288d89b178c77ea5f71ee0a0d5947df76a49a3a8c8a9610400000003b925bd3f6419f24555de"], 0x59) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000001) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) creat(&(0x7f00000003c0)='./file1\x00', 0x0) 07:51:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0xc8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe875}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5456}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_NODE={0x4}]}, 0xc8}, 0x1, 0x0, 0x0, 0x400000000}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:51:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:51:35 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) close(r0) fcntl$dupfd(r1, 0x0, r0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) 07:51:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00\x00\xd6\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000740)={0x1f, 0x8001, 0x0, 0x0, 0x0, 0xfb, &(0x7f0000000640)=""/251, 0xb9, &(0x7f0000000440)=""/185}) 07:51:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)=ANY=[], 0x0) rmdir(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x1a, 0x4) 07:51:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0xc8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe875}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5456}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_NODE={0x4}]}, 0xc8}, 0x1, 0x0, 0x0, 0x400000000}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1284.550190] kauditd_printk_skb: 207 callbacks suppressed [ 1284.550199] audit: type=1400 audit(1557215496.133:4953): avc: denied { map } for pid=3290 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000540)="a6", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cddd846f1bcd822043e190dd1f40e64d998a1e1a6d17297f5b7907f446019b0bb495f8ef97d636318db1eb25a44fdb7d8d14fc6b6f6650e11e2a12be4fab45e5c933da483b6cdf814b92003f5bf7344e80c23e37770853b24b8cb86c923292938961d92811a54b51c2ccf5d6f21f59e84a2d5c939df3c968d293689075d4e2588fb1329e17fe", 0xd1, 0x0, 0x0, 0x0) r1 = request_key(&(0x7f0000000140)='trusted\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x14000, 0x0) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000040), 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) ioctl$VIDIOC_ENCODER_CMD(0xffffffffffffffff, 0xc028564d, &(0x7f0000000380)={0x3, 0x1, [0x8, 0x4, 0x7, 0x8000, 0xc5c, 0x6, 0x3921, 0x20a]}) msgget$private(0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1284.752971] audit: type=1400 audit(1557215496.173:4954): avc: denied { map } for pid=3285 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:36 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) close(r0) fcntl$dupfd(r1, 0x0, r0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) [ 1284.996315] audit: type=1400 audit(1557215496.183:4955): avc: denied { map } for pid=3285 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1285.241144] audit: type=1400 audit(1557215496.193:4956): avc: denied { map } for pid=3290 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1285.498722] audit: type=1400 audit(1557215496.193:4957): avc: denied { map } for pid=3290 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1285.687745] audit: type=1400 audit(1557215496.193:4958): avc: denied { map } for pid=3290 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1285.933359] audit: type=1400 audit(1557215496.263:4959): avc: denied { map } for pid=3297 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1286.123835] audit: type=1400 audit(1557215496.273:4960): avc: denied { map } for pid=3297 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1286.294716] audit: type=1400 audit(1557215496.293:4961): avc: denied { map } for pid=3290 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1286.419703] audit: type=1400 audit(1557215496.293:4962): avc: denied { map } for pid=3297 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10004}, 0xc, 0x0}, 0x0) 07:51:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00\x00\xd6\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000740)={0x1f, 0x8001, 0x0, 0x0, 0x0, 0xfb, &(0x7f0000000640)=""/251, 0xb9, &(0x7f0000000440)=""/185}) 07:51:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)=ANY=[], 0x0) rmdir(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x1a, 0x4) 07:51:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)=ANY=[], 0x0) rmdir(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x1a, 0x4) 07:51:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0xc8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe875}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5456}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_NODE={0x4}]}, 0xc8}, 0x1, 0x0, 0x0, 0x400000000}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:51:38 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000540)="a6", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cddd846f1bcd822043e190dd1f40e64d998a1e1a6d17297f5b7907f446019b0bb495f8ef97d636318db1eb25a44fdb7d8d14fc6b6f6650e11e2a12be4fab45e5c933da483b6cdf814b92003f5bf7344e80c23e37770853b24b8cb86c923292938961d92811a54b51c2ccf5d6f21f59e84a2d5c939df3c968d293689075d4e2588fb1329e17fe", 0xd1, 0x0, 0x0, 0x0) r1 = request_key(&(0x7f0000000140)='trusted\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x14000, 0x0) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000040), 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) ioctl$VIDIOC_ENCODER_CMD(0xffffffffffffffff, 0xc028564d, &(0x7f0000000380)={0x3, 0x1, [0x8, 0x4, 0x7, 0x8000, 0xc5c, 0x6, 0x3921, 0x20a]}) msgget$private(0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 07:51:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)=ANY=[], 0x0) rmdir(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x1a, 0x4) 07:51:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)=ANY=[], 0x0) rmdir(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x1a, 0x4) 07:51:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00\x00\xd6\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000740)={0x1f, 0x8001, 0x0, 0x0, 0x0, 0xfb, &(0x7f0000000640)=""/251, 0xb9, &(0x7f0000000440)=""/185}) 07:51:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00\x00\xd6\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000740)={0x1f, 0x8001, 0x0, 0x0, 0x0, 0xfb, &(0x7f0000000640)=""/251, 0xb9, &(0x7f0000000440)=""/185}) 07:51:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)=ANY=[], 0x0) rmdir(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x1a, 0x4) 07:51:39 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000540)="a6", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cddd846f1bcd822043e190dd1f40e64d998a1e1a6d17297f5b7907f446019b0bb495f8ef97d636318db1eb25a44fdb7d8d14fc6b6f6650e11e2a12be4fab45e5c933da483b6cdf814b92003f5bf7344e80c23e37770853b24b8cb86c923292938961d92811a54b51c2ccf5d6f21f59e84a2d5c939df3c968d293689075d4e2588fb1329e17fe", 0xd1, 0x0, 0x0, 0x0) r1 = request_key(&(0x7f0000000140)='trusted\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x14000, 0x0) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000040), 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) ioctl$VIDIOC_ENCODER_CMD(0xffffffffffffffff, 0xc028564d, &(0x7f0000000380)={0x3, 0x1, [0x8, 0x4, 0x7, 0x8000, 0xc5c, 0x6, 0x3921, 0x20a]}) msgget$private(0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 07:51:41 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000540)="a6", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cddd846f1bcd822043e190dd1f40e64d998a1e1a6d17297f5b7907f446019b0bb495f8ef97d636318db1eb25a44fdb7d8d14fc6b6f6650e11e2a12be4fab45e5c933da483b6cdf814b92003f5bf7344e80c23e37770853b24b8cb86c923292938961d92811a54b51c2ccf5d6f21f59e84a2d5c939df3c968d293689075d4e2588fb1329e17fe", 0xd1, 0x0, 0x0, 0x0) r1 = request_key(&(0x7f0000000140)='trusted\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x14000, 0x0) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000040), 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) ioctl$VIDIOC_ENCODER_CMD(0xffffffffffffffff, 0xc028564d, &(0x7f0000000380)={0x3, 0x1, [0x8, 0x4, 0x7, 0x8000, 0xc5c, 0x6, 0x3921, 0x20a]}) msgget$private(0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 07:51:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)=ANY=[], 0x0) rmdir(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x1a, 0x4) 07:51:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) syz_genetlink_get_family_id$tipc(0x0) 07:51:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000002c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000340), 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x80000000023) fcntl$setstatus(r0, 0x4, 0x427ff) 07:51:41 executing program 3: syz_execute_func(&(0x7f0000000600)="b60c04e5052eab5b4b4b7df965470f0d4e0e0f2fc6d8d8c4226d40446b880059c4c40f410a66420f383b85a1f69ede80557908c1c1ea01269dcaca0f168e11eca666460f1ba942c134dc660f383c4a645d3667806666430fefb300000000e8ab04f4f4af2c66ec606d26d7e326c4427d215ded3facce054848d20000b16466b5da2e440f3acc6703670035b8a23df30f2db800008041") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f1202123f319bd070") [ 1289.601198] kauditd_printk_skb: 199 callbacks suppressed [ 1289.601207] audit: type=1400 audit(1557215501.193:5162): avc: denied { create } for pid=3371 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 07:51:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000d80)="73004a2be92c6293980f053e64acc4a37bf0c50441e2e905eb66d995f21440c461fb2cbb5bfd0000c4221536820a000100660f38463da16379637902000000160ad27ddec17ddec1ab66fcc4027918f852388e3a2982388e3a2942f9337607430facf200c2e54c4cbec5c54dc32c718f56eec442319ebb70fe6581f0430fc0b267f34cb4c4827d19bd0f00000088fbc4a2f1923c80aef2ae0f3a162888c4217b12a32200000066450f71e6aa26660fdf53098f69609bfb87a8e1430fae332766450f3a14ec3a0f3a20b9feef7fffead8a1bea02ad764642667460fbca621d9be6821a83a5fc0c0660f3804e0c481d55cf4ca30ca400f38253d0300000067ddea6444fe044436420fafd4400f18082ddd8f0b00c4227d253576000000660f515100ffd2fb660f38df7b925d0fbaa716070000092e440fdd0636b2aac4224741afa20f6baf00c4e399784104c0414e598374ff0a07450f633c0cd28a7d59b02400088004450f01de8f0830eeb83f000000d458c4c209b88c3500008020f20f1dbe00100000c401296bec9a6597360f3803d2f00a04f00a04472e660f01c12e47afa48bb9c998f340032f03616500000800000042b6a7a75ef243d8edc4414974ec660f3a0bb50600000000323166dbd1f0ff51653bec") 07:51:41 executing program 2: syz_execute_func(&(0x7f0000000400)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'erspan0\x00', 0x3}, 0x18) syz_execute_func(&(0x7f0000000640)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r1, 0x40b) request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0xffffffffffffffff) [ 1289.920114] audit: type=1400 audit(1557215501.233:5163): avc: denied { setopt } for pid=3371 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1290.127750] audit: type=1400 audit(1557215501.343:5164): avc: denied { create } for pid=3369 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1290.353211] audit: type=1400 audit(1557215501.343:5165): avc: denied { write } for pid=3369 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 07:51:42 executing program 3: syz_execute_func(&(0x7f0000000600)="b60c04e5052eab5b4b4b7df965470f0d4e0e0f2fc6d8d8c4226d40446b880059c4c40f410a66420f383b85a1f69ede80557908c1c1ea01269dcaca0f168e11eca666460f1ba942c134dc660f383c4a645d3667806666430fefb300000000e8ab04f4f4af2c66ec606d26d7e326c4427d215ded3facce054848d20000b16466b5da2e440f3acc6703670035b8a23df30f2db800008041") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f1202123f319bd070") [ 1290.547940] audit: type=1400 audit(1557215501.423:5166): avc: denied { map } for pid=3383 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1290.695463] IPVS: sync thread started: state = BACKUP, mcast_ifn = erspan0, syncid = 3, id = 0 [ 1290.704715] audit: type=1400 audit(1557215501.433:5167): avc: denied { map } for pid=3383 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1290.894896] audit: type=1400 audit(1557215501.443:5168): avc: denied { map } for pid=3382 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:42 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unshare(0x24020400) fchdir(r0) 07:51:42 executing program 4: syz_execute_func(&(0x7f0000000000)="1c3eb5b598cd801b69e466430f3802326962f5696200d9d9d0e1493a5bf98fe9589b26c4419d608500000000e10135fec4427dc400c191441db42a2afa00c4c476768f48680850eebc02008020002000dd6d68074851c4a3295f17f7f3440f52b60c000000eac4616f731511f265dc5f00b25b8c5b5b363eb8821f821f66030fae6464f20f2aca0f5e5bf4c4e36102d165c401fe5ff6e3df544736677066c44279f3250a0f01c3e400c422dd9c90") [ 1291.063270] audit: type=1400 audit(1557215501.453:5169): avc: denied { map } for pid=3383 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1291.260477] audit: type=1400 audit(1557215501.453:5170): avc: denied { map } for pid=3383 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:43 executing program 2: syz_execute_func(&(0x7f0000000400)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'erspan0\x00', 0x3}, 0x18) syz_execute_func(&(0x7f0000000640)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r1, 0x40b) request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0xffffffffffffffff) 07:51:43 executing program 4: syz_execute_func(&(0x7f0000000000)="1c3eb5b598cd801b69e466430f3802326962f5696200d9d9d0e1493a5bf98fe9589b26c4419d608500000000e10135fec4427dc400c191441db42a2afa00c4c476768f48680850eebc02008020002000dd6d68074851c4a3295f17f7f3440f52b60c000000eac4616f731511f265dc5f00b25b8c5b5b363eb8821f821f66030fae6464f20f2aca0f5e5bf4c4e36102d165c401fe5ff6e3df544736677066c44279f3250a0f01c3e400c422dd9c90") [ 1291.461335] audit: type=1400 audit(1557215501.483:5171): avc: denied { map } for pid=3382 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:43 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unshare(0x24020400) fchdir(r0) 07:51:43 executing program 4: syz_execute_func(&(0x7f0000000000)="1c3eb5b598cd801b69e466430f3802326962f5696200d9d9d0e1493a5bf98fe9589b26c4419d608500000000e10135fec4427dc400c191441db42a2afa00c4c476768f48680850eebc02008020002000dd6d68074851c4a3295f17f7f3440f52b60c000000eac4616f731511f265dc5f00b25b8c5b5b363eb8821f821f66030fae6464f20f2aca0f5e5bf4c4e36102d165c401fe5ff6e3df544736677066c44279f3250a0f01c3e400c422dd9c90") 07:51:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) syz_genetlink_get_family_id$tipc(0x0) 07:51:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) syz_genetlink_get_family_id$tipc(0x0) 07:51:44 executing program 3: syz_execute_func(&(0x7f0000000600)="b60c04e5052eab5b4b4b7df965470f0d4e0e0f2fc6d8d8c4226d40446b880059c4c40f410a66420f383b85a1f69ede80557908c1c1ea01269dcaca0f168e11eca666460f1ba942c134dc660f383c4a645d3667806666430fefb300000000e8ab04f4f4af2c66ec606d26d7e326c4427d215ded3facce054848d20000b16466b5da2e440f3acc6703670035b8a23df30f2db800008041") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f1202123f319bd070") 07:51:44 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unshare(0x24020400) fchdir(r0) 07:51:44 executing program 4: syz_execute_func(&(0x7f0000000000)="1c3eb5b598cd801b69e466430f3802326962f5696200d9d9d0e1493a5bf98fe9589b26c4419d608500000000e10135fec4427dc400c191441db42a2afa00c4c476768f48680850eebc02008020002000dd6d68074851c4a3295f17f7f3440f52b60c000000eac4616f731511f265dc5f00b25b8c5b5b363eb8821f821f66030fae6464f20f2aca0f5e5bf4c4e36102d165c401fe5ff6e3df544736677066c44279f3250a0f01c3e400c422dd9c90") 07:51:44 executing program 2: syz_execute_func(&(0x7f0000000400)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'erspan0\x00', 0x3}, 0x18) syz_execute_func(&(0x7f0000000640)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r1, 0x40b) request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0xffffffffffffffff) 07:51:45 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unshare(0x24020400) fchdir(r0) 07:51:45 executing program 3: syz_execute_func(&(0x7f0000000600)="b60c04e5052eab5b4b4b7df965470f0d4e0e0f2fc6d8d8c4226d40446b880059c4c40f410a66420f383b85a1f69ede80557908c1c1ea01269dcaca0f168e11eca666460f1ba942c134dc660f383c4a645d3667806666430fefb300000000e8ab04f4f4af2c66ec606d26d7e326c4427d215ded3facce054848d20000b16466b5da2e440f3acc6703670035b8a23df30f2db800008041") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f1202123f319bd070") 07:51:45 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unshare(0x24020400) fchdir(r0) 07:51:46 executing program 5: syz_execute_func(&(0x7f0000000400)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'erspan0\x00', 0x3}, 0x18) syz_execute_func(&(0x7f0000000640)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r1, 0x40b) request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0xffffffffffffffff) 07:51:46 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unshare(0x24020400) fchdir(r0) [ 1294.628938] kauditd_printk_skb: 196 callbacks suppressed [ 1294.628947] audit: type=1400 audit(1557215506.213:5368): avc: denied { map } for pid=3460 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1294.823818] audit: type=1400 audit(1557215506.213:5369): avc: denied { map } for pid=3460 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:46 executing program 2: syz_execute_func(&(0x7f0000000400)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'erspan0\x00', 0x3}, 0x18) syz_execute_func(&(0x7f0000000640)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r1, 0x40b) request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0xffffffffffffffff) [ 1295.033603] audit: type=1400 audit(1557215506.273:5370): avc: denied { map } for pid=3460 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.198032] audit: type=1400 audit(1557215506.293:5371): avc: denied { map } for pid=3460 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.288771] IPVS: sync thread started: state = BACKUP, mcast_ifn = erspan0, syncid = 3, id = 0 07:51:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) syz_genetlink_get_family_id$tipc(0x0) [ 1295.478420] audit: type=1400 audit(1557215506.363:5372): avc: denied { map } for pid=3460 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.660920] audit: type=1400 audit(1557215506.363:5373): avc: denied { map } for pid=3460 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.803348] audit: type=1400 audit(1557215506.653:5374): avc: denied { map } for pid=3463 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) syz_genetlink_get_family_id$tipc(0x0) 07:51:47 executing program 3: epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 07:51:47 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unshare(0x24020400) fchdir(r0) [ 1296.025237] audit: type=1400 audit(1557215506.663:5375): avc: denied { map } for pid=3463 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:47 executing program 5: syz_execute_func(&(0x7f0000000400)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'erspan0\x00', 0x3}, 0x18) syz_execute_func(&(0x7f0000000640)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r1, 0x40b) request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0xffffffffffffffff) [ 1296.196427] audit: type=1400 audit(1557215506.683:5376): avc: denied { map } for pid=3463 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1296.459868] audit: type=1400 audit(1557215506.703:5377): avc: denied { map } for pid=3463 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:48 executing program 3: epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 07:51:48 executing program 4: epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 07:51:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x2, 0x2, 0x4}) 07:51:49 executing program 3: epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 07:51:49 executing program 4: epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 07:51:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") readv(0xffffffffffffffff, &(0x7f0000001780), 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0), 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:51:49 executing program 5: syz_execute_func(&(0x7f0000000400)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'erspan0\x00', 0x3}, 0x18) syz_execute_func(&(0x7f0000000640)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r1, 0x40b) request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0xffffffffffffffff) 07:51:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) syz_genetlink_get_family_id$tipc(0x0) [ 1299.653980] kauditd_printk_skb: 169 callbacks suppressed [ 1299.653989] audit: type=1400 audit(1557215511.243:5547): avc: denied { map } for pid=3536 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:51 executing program 3: epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 07:51:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) syz_genetlink_get_family_id$tipc(0x0) 07:51:51 executing program 4: epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 07:51:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") readv(0xffffffffffffffff, &(0x7f0000001780), 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0), 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:51:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") readv(0xffffffffffffffff, &(0x7f0000001780), 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0), 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 1299.863746] audit: type=1400 audit(1557215511.243:5548): avc: denied { map } for pid=3536 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1299.991019] audit: type=1400 audit(1557215511.303:5549): avc: denied { map } for pid=3536 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1300.153516] audit: type=1400 audit(1557215511.313:5550): avc: denied { map } for pid=3536 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0x0, 0xffffffffffff3e2c}) [ 1300.356920] audit: type=1400 audit(1557215511.473:5551): avc: denied { read } for pid=3531 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 07:51:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="b136b09191806969ef69dc00d938c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4dee4f9c45149f2168f4808eebce00000802000c421fc51c12aea360fb56ae2c48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c48101fe5ff6f6df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") [ 1300.593257] audit: type=1400 audit(1557215512.083:5552): avc: denied { map } for pid=3550 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1300.800286] audit: type=1400 audit(1557215512.083:5553): avc: denied { map } for pid=3550 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1301.036959] audit: type=1400 audit(1557215512.113:5554): avc: denied { map } for pid=3550 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") readv(0xffffffffffffffff, &(0x7f0000001780), 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0), 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 1301.255391] audit: type=1400 audit(1557215512.123:5555): avc: denied { create } for pid=3546 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 07:51:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0x0, 0xffffffffffff3e2c}) [ 1301.497137] audit: type=1400 audit(1557215512.123:5556): avc: denied { map } for pid=3550 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="b136b09191806969ef69dc00d938c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4dee4f9c45149f2168f4808eebce00000802000c421fc51c12aea360fb56ae2c48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c48101fe5ff6f6df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") 07:51:53 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000000)) setresgid(0x0, 0x0, 0xffffffffffffffff) 07:51:54 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000000)) setresgid(0x0, 0x0, 0xffffffffffffffff) 07:51:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0x0, 0xffffffffffff3e2c}) 07:51:54 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000000)) setresgid(0x0, 0x0, 0xffffffffffffffff) 07:51:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x26, 0x0, &(0x7f0000000080)) 07:51:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") readv(0xffffffffffffffff, &(0x7f0000001780), 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0), 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:51:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0x0, 0xffffffffffff3e2c}) 07:51:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="b136b09191806969ef69dc00d938c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4dee4f9c45149f2168f4808eebce00000802000c421fc51c12aea360fb56ae2c48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c48101fe5ff6f6df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") 07:51:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x26, 0x0, &(0x7f0000000080)) [ 1304.720571] kauditd_printk_skb: 137 callbacks suppressed [ 1304.720579] audit: type=1400 audit(1557215516.313:5694): avc: denied { map } for pid=3601 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1304.955809] audit: type=1400 audit(1557215516.343:5695): avc: denied { map } for pid=3601 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") readv(0xffffffffffffffff, &(0x7f0000001780), 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0), 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:51:56 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000000)) setresgid(0x0, 0x0, 0xffffffffffffffff) 07:51:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x26, 0x0, &(0x7f0000000080)) 07:51:56 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) 07:51:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="b136b09191806969ef69dc00d938c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4dee4f9c45149f2168f4808eebce00000802000c421fc51c12aea360fb56ae2c48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c48101fe5ff6f6df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") [ 1305.254269] audit: type=1400 audit(1557215516.843:5696): avc: denied { map } for pid=3609 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2160f01c4c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000800)="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") 07:51:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") readv(0xffffffffffffffff, &(0x7f0000001780), 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0), 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 1305.415521] audit: type=1400 audit(1557215516.873:5697): avc: denied { map } for pid=3609 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x26, 0x0, &(0x7f0000000080)) 07:51:57 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) [ 1305.601848] audit: type=1400 audit(1557215516.893:5698): avc: denied { map } for pid=3609 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1305.755639] audit: type=1400 audit(1557215516.893:5699): avc: denied { map } for pid=3609 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1305.966499] audit: type=1400 audit(1557215516.953:5700): avc: denied { map } for pid=3609 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:51:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x50, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x50}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c41730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:51:57 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) [ 1306.182343] audit: type=1400 audit(1557215516.983:5701): avc: denied { map } for pid=3609 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1306.410298] audit: type=1400 audit(1557215516.993:5702): avc: denied { map } for pid=3609 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1306.643976] audit: type=1400 audit(1557215517.013:5703): avc: denied { map } for pid=3612 comm="syz-executor.3" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=173277 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 07:51:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='tunl0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r2, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x9) 07:52:00 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) 07:52:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='tunl0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r2, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x9) 07:52:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2160f01c4c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000800)="416bf4c04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c0620f66420f5dc423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0428385000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa6c401e16110c481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dada0f5ea5a9a50000ffbedc4e61c9553131b83a00a2b0fbaf3b62") 07:52:00 executing program 2: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000040)={0x9, 0x20000000001, "1f"}, 0x10000) 07:52:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x50, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x50}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c41730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:52:00 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f000066c000/0x2000)=nil, 0x2000, 0x9) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:52:00 executing program 2: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000040)={0x9, 0x20000000001, "1f"}, 0x10000) 07:52:00 executing program 3: execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05'], &(0x7f0000000280)=[&(0x7f0000000140)='ppp0$cgroup\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='wlan1selinux[@vmnet0bdev\x00']) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}, 0x7fffffff}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 07:52:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='tunl0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r2, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x9) 07:52:01 executing program 2: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000040)={0x9, 0x20000000001, "1f"}, 0x10000) 07:52:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x50, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x50}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c41730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:52:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2160f01c4c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000800)="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") 07:52:01 executing program 3: execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05'], &(0x7f0000000280)=[&(0x7f0000000140)='ppp0$cgroup\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='wlan1selinux[@vmnet0bdev\x00']) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}, 0x7fffffff}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 1309.976984] kauditd_printk_skb: 170 callbacks suppressed [ 1309.976992] audit: type=1400 audit(1557215521.563:5865): avc: denied { map } for pid=3678 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1310.135441] audit: type=1400 audit(1557215521.603:5866): avc: denied { map } for pid=3678 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1310.277652] audit: type=1400 audit(1557215521.613:5867): avc: denied { map } for pid=3678 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:01 executing program 2: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000040)={0x9, 0x20000000001, "1f"}, 0x10000) [ 1310.455499] audit: type=1400 audit(1557215521.623:5868): avc: denied { map } for pid=3678 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='tunl0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r2, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x9) [ 1310.662799] audit: type=1400 audit(1557215521.663:5869): avc: denied { map } for pid=3678 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:02 executing program 3: execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05'], &(0x7f0000000280)=[&(0x7f0000000140)='ppp0$cgroup\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='wlan1selinux[@vmnet0bdev\x00']) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}, 0x7fffffff}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 1310.866898] audit: type=1400 audit(1557215521.703:5870): avc: denied { map } for pid=3678 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1311.083360] audit: type=1400 audit(1557215521.713:5871): avc: denied { map } for pid=3678 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x50, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x50}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c41730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1311.298449] audit: type=1400 audit(1557215521.773:5872): avc: denied { map } for pid=3678 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:03 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f000066c000/0x2000)=nil, 0x2000, 0x9) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:52:03 executing program 2: execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05'], &(0x7f0000000280)=[&(0x7f0000000140)='ppp0$cgroup\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='wlan1selinux[@vmnet0bdev\x00']) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}, 0x7fffffff}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 1311.521429] audit: type=1400 audit(1557215521.773:5873): avc: denied { map } for pid=3678 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2160f01c4c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000800)="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") 07:52:03 executing program 3: execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05'], &(0x7f0000000280)=[&(0x7f0000000140)='ppp0$cgroup\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='wlan1selinux[@vmnet0bdev\x00']) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}, 0x7fffffff}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 1311.704568] audit: audit_backlog=65 > audit_backlog_limit=64 07:52:03 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f000066c000/0x2000)=nil, 0x2000, 0x9) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:52:03 executing program 2: execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05'], &(0x7f0000000280)=[&(0x7f0000000140)='ppp0$cgroup\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='wlan1selinux[@vmnet0bdev\x00']) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}, 0x7fffffff}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 07:52:04 executing program 3: execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05'], &(0x7f0000000280)=[&(0x7f0000000140)='ppp0$cgroup\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='wlan1selinux[@vmnet0bdev\x00']) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}, 0x7fffffff}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 07:52:04 executing program 0: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000280)={0x0}) 07:52:04 executing program 3: execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05'], &(0x7f0000000280)=[&(0x7f0000000140)='ppp0$cgroup\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='wlan1selinux[@vmnet0bdev\x00']) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}, 0x7fffffff}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 07:52:04 executing program 2: execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05'], &(0x7f0000000280)=[&(0x7f0000000140)='ppp0$cgroup\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='wlan1selinux[@vmnet0bdev\x00']) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}, 0x7fffffff}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 07:52:05 executing program 1: setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x7530}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="b11b91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb0fc4014c58c4a1e96be7c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4c4837d1118fbc40213f5930a0000000013a4001369879f000000fe") 07:52:05 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f000066c000/0x2000)=nil, 0x2000, 0x9) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:52:05 executing program 3: execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05'], &(0x7f0000000280)=[&(0x7f0000000140)='ppp0$cgroup\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='wlan1selinux[@vmnet0bdev\x00']) sendmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}, 0x7fffffff}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 07:52:05 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f000066c000/0x2000)=nil, 0x2000, 0x9) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:52:05 executing program 1: setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x7530}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="b11b91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb0fc4014c58c4a1e96be7c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4c4837d1118fbc40213f5930a0000000013a4001369879f000000fe") 07:52:05 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f00000003c0), 0x0) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000100)={0x1, 0x0, [{0x0, 0x0, 0x1ff}]}) 07:52:05 executing program 0: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000280)={0x0}) 07:52:06 executing program 1: setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x7530}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="b11b91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb0fc4014c58c4a1e96be7c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4c4837d1118fbc40213f5930a0000000013a4001369879f000000fe") 07:52:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0x338d, 0x7}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) [ 1315.124371] kauditd_printk_skb: 191 callbacks suppressed [ 1315.124387] audit: type=1400 audit(1557215526.713:6063): avc: denied { map } for pid=3775 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:06 executing program 1: setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x7530}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="b11b91cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb0fc4014c58c4a1e96be7c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4c4837d1118fbc40213f5930a0000000013a4001369879f000000fe") [ 1315.314719] audit: type=1400 audit(1557215526.743:6064): avc: denied { map } for pid=3775 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1315.440520] audit: type=1400 audit(1557215526.763:6065): avc: denied { map } for pid=3775 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0x338d, 0x7}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) [ 1315.567838] audit: type=1400 audit(1557215526.783:6066): avc: denied { map } for pid=3775 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:07 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f000066c000/0x2000)=nil, 0x2000, 0x9) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1315.720736] audit: type=1400 audit(1557215526.823:6067): avc: denied { map } for pid=3775 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:07 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f000066c000/0x2000)=nil, 0x2000, 0x9) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:52:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="b13691c483394c1d00000100006969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9439ac7c7c7c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6f0448393021848203b646736676666430fefb3000000000804f4f30f1a12cc111d54111d00") sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") [ 1315.861988] audit: type=1400 audit(1557215526.853:6068): avc: denied { map } for pid=3775 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1315.977981] audit: type=1400 audit(1557215526.863:6069): avc: denied { map } for pid=3775 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0x338d, 0x7}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) [ 1316.095258] audit: type=1400 audit(1557215526.893:6070): avc: denied { map } for pid=3775 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:07 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f00000003c0), 0x0) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000100)={0x1, 0x0, [{0x0, 0x0, 0x1ff}]}) [ 1316.260245] audit: type=1400 audit(1557215526.893:6071): avc: denied { map } for pid=3775 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1316.457465] audit: type=1400 audit(1557215526.943:6072): avc: denied { map } for pid=3777 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0x338d, 0x7}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) 07:52:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="b13691c483394c1d00000100006969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9439ac7c7c7c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6f0448393021848203b646736676666430fefb3000000000804f4f30f1a12cc111d54111d00") sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") 07:52:09 executing program 0: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000280)={0x0}) 07:52:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="b13691c483394c1d00000100006969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9439ac7c7c7c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6f0448393021848203b646736676666430fefb3000000000804f4f30f1a12cc111d54111d00") sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") 07:52:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl(0xffffffffffffffff, 0x80001000008912, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0x0) lookup_dcookie(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xc0f7) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) umount2(&(0x7f0000000280)='./file0\x00', 0x0) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3ff404fe181774771467ac32e2aac1dce74c1a789416a28bf47355d05a66caa74d6848", 0x8b, 0xfffffffffffffffb) 07:52:09 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x11, 0x2, r0, 0x0) read(r1, 0x0, 0x53) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 07:52:09 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x11, 0x2, r0, 0x0) read(r1, 0x0, 0x53) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 07:52:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl(0xffffffffffffffff, 0x80001000008912, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0x0) lookup_dcookie(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xc0f7) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) umount2(&(0x7f0000000280)='./file0\x00', 0x0) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3ff404fe181774771467ac32e2aac1dce74c1a789416a28bf47355d05a66caa74d6848", 0x8b, 0xfffffffffffffffb) 07:52:10 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f00000003c0), 0x0) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000100)={0x1, 0x0, [{0x0, 0x0, 0x1ff}]}) 07:52:10 executing program 0: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000280)={0x0}) 07:52:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="b13691c483394c1d00000100006969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9439ac7c7c7c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6f0448393021848203b646736676666430fefb3000000000804f4f30f1a12cc111d54111d00") sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="416bf4c04a2ae92ca842980f050f427ce444c4a37bf0c50241e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b26660f38091e2fdee5bebec42104ca67f30f167800c421dd584243c4e10bf8d4d9c0620f66420f5dc423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf8466f2ab440fec3fc4423d9f9346000000660f79ce768a899294d80200490f2d8f0b000000c2a0c10b00ccf0428385000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa6f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa67f243a75c450f91f3dada0f5ea5a9a50000ffbedc4e61c9553131b83a00a2b0fbfb3b62") 07:52:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="b13691c483394c1d00000100006969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9439ac7c7c7c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6f0448393021848203b646736676666430fefb3000000000804f4f30f1a12cc111d54111d00") sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") 07:52:10 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x11, 0x2, r0, 0x0) read(r1, 0x0, 0x53) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 07:52:11 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl(0xffffffffffffffff, 0x80001000008912, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0x0) lookup_dcookie(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xc0f7) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) umount2(&(0x7f0000000280)='./file0\x00', 0x0) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3ff404fe181774771467ac32e2aac1dce74c1a789416a28bf47355d05a66caa74d6848", 0x8b, 0xfffffffffffffffb) 07:52:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl(0xffffffffffffffff, 0x80001000008912, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0x0) lookup_dcookie(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xc0f7) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) umount2(&(0x7f0000000280)='./file0\x00', 0x0) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3ff404fe181774771467ac32e2aac1dce74c1a789416a28bf47355d05a66caa74d6848", 0x8b, 0xfffffffffffffffb) [ 1320.201808] kauditd_printk_skb: 185 callbacks suppressed [ 1320.201817] audit: type=1400 audit(1557215531.793:6258): avc: denied { map } for pid=3862 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:11 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x11, 0x2, r0, 0x0) read(r1, 0x0, 0x53) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) [ 1320.452014] audit: type=1400 audit(1557215531.823:6259): avc: denied { map } for pid=3859 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1320.725389] audit: type=1400 audit(1557215531.823:6260): avc: denied { map } for pid=3859 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1320.973258] audit: type=1400 audit(1557215531.833:6261): avc: denied { map } for pid=3862 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1321.306016] audit: type=1400 audit(1557215531.833:6262): avc: denied { map } for pid=3862 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1321.548866] audit: type=1400 audit(1557215531.883:6263): avc: denied { map } for pid=3862 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:13 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl(0xffffffffffffffff, 0x80001000008912, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0x0) lookup_dcookie(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xc0f7) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) umount2(&(0x7f0000000280)='./file0\x00', 0x0) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3ff404fe181774771467ac32e2aac1dce74c1a789416a28bf47355d05a66caa74d6848", 0x8b, 0xfffffffffffffffb) 07:52:13 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) chroot(&(0x7f0000000740)='./file0\x00') mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000000040)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) 07:52:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl(0xffffffffffffffff, 0x80001000008912, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0x0) lookup_dcookie(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xc0f7) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) umount2(&(0x7f0000000280)='./file0\x00', 0x0) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3ff404fe181774771467ac32e2aac1dce74c1a789416a28bf47355d05a66caa74d6848", 0x8b, 0xfffffffffffffffb) [ 1321.803415] audit: type=1400 audit(1557215532.203:6264): avc: denied { map } for pid=3868 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1322.004316] audit: type=1400 audit(1557215532.273:6265): avc: denied { map } for pid=3869 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:13 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f00000003c0), 0x0) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000100)={0x1, 0x0, [{0x0, 0x0, 0x1ff}]}) 07:52:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="b13691c483394c1d00000100006969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9439ac7c7c7c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6f0448393021848203b646736676666430fefb3000000000804f4f30f1a12cc111d54111d00") sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") [ 1322.182762] audit: type=1400 audit(1557215532.303:6266): avc: denied { map } for pid=3868 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1322.355601] audit: type=1400 audit(1557215532.303:6267): avc: denied { map } for pid=3868 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000800)="b13691c483394c1d00000100006969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9439ac7c7c7c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6f0448393021848203b646736676666430fefb3000000000804f4f30f1a12cc111d54111d00") sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000006c0)="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") 07:52:14 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) chroot(&(0x7f0000000740)='./file0\x00') mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000000040)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) 07:52:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000465000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') 07:52:15 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) chroot(&(0x7f0000000740)='./file0\x00') mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000000040)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) 07:52:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000465000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') 07:52:16 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) chroot(&(0x7f0000000740)='./file0\x00') mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000000040)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) [ 1325.215799] kauditd_printk_skb: 134 callbacks suppressed [ 1325.215807] audit: type=1400 audit(1557215536.803:6402): avc: denied { map } for pid=3926 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:16 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl(0xffffffffffffffff, 0x80001000008912, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0x0) lookup_dcookie(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xc0f7) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) umount2(&(0x7f0000000280)='./file0\x00', 0x0) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3ff404fe181774771467ac32e2aac1dce74c1a789416a28bf47355d05a66caa74d6848", 0x8b, 0xfffffffffffffffb) [ 1325.448099] audit: type=1400 audit(1557215536.803:6403): avc: denied { map } for pid=3926 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1325.738312] audit: type=1400 audit(1557215536.823:6404): avc: denied { map } for pid=3925 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000465000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') [ 1325.959616] audit: type=1400 audit(1557215536.823:6405): avc: denied { map } for pid=3925 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000465000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') [ 1326.141702] audit: type=1400 audit(1557215536.863:6406): avc: denied { map } for pid=3926 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000465000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') 07:52:18 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x8402, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() capset(0x0, 0x0) setxattr$security_smack_entry(0x0, &(0x7f0000000180)='security.SMACK64\x00', &(0x7f00000001c0)='/dev/ptmx\x00', 0xa, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x5) syz_genetlink_get_family_id$ipvs(0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000640)=""/176) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) close(r1) timerfd_create(0x4, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='security.SMACK64\x00', 0xfffffffffffffffe) write$evdev(r0, &(0x7f0000000080)=[{{0x0, 0x2710}, 0x5, 0x80000001, 0x1000000000000004}, {{0x0, 0x7530}, 0x15, 0x6}], 0x30) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) 07:52:18 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000040)={0x58, 0x2}) [ 1326.418065] audit: type=1400 audit(1557215536.883:6407): avc: denied { map } for pid=3925 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1326.672759] audit: type=1400 audit(1557215536.913:6408): avc: denied { map } for pid=3926 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:18 executing program 0: unshare(0x20400) syz_execute_func(&(0x7f0000000040)="9877774a2ae92cb81c050f05bf02000000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0x247}, 0xfffffffffffffff1) 07:52:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000465000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') [ 1326.921792] audit: type=1400 audit(1557215536.933:6409): avc: denied { map } for pid=3926 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1327.062138] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1327.071648] audit: audit_backlog=65 > audit_backlog_limit=64 07:52:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000465000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') 07:52:19 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000040)={0x58, 0x2}) 07:52:19 executing program 0: unshare(0x20400) syz_execute_func(&(0x7f0000000040)="9877774a2ae92cb81c050f05bf02000000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0x247}, 0xfffffffffffffff1) 07:52:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000465000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') [ 1328.160630] mkiss: ax0: crc mode is auto. 07:52:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000465000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') 07:52:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba000000008342f228280804f4c441a5609c8ba800000054838b") 07:52:20 executing program 0: unshare(0x20400) syz_execute_func(&(0x7f0000000040)="9877774a2ae92cb81c050f05bf02000000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0x247}, 0xfffffffffffffff1) 07:52:20 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000040)={0x58, 0x2}) 07:52:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f0000465000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') 07:52:20 executing program 0: unshare(0x20400) syz_execute_func(&(0x7f0000000040)="9877774a2ae92cb81c050f05bf02000000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0x247}, 0xfffffffffffffff1) 07:52:21 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000040)={0x58, 0x2}) 07:52:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c41730fc4223997d48f0f14e7e7018f2980dfe7df660fe7af5cc34a510804f4c441a5609c8ba800000099") socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:52:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba000000008342f228280804f4c441a5609c8ba800000054838b") [ 1330.224335] kauditd_printk_skb: 256 callbacks suppressed [ 1330.224350] audit: type=1400 audit(1557215541.813:6659): avc: denied { map } for pid=4011 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1330.520192] audit: type=1400 audit(1557215541.813:6660): avc: denied { map } for pid=4011 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:22 executing program 0: syz_emit_ethernet(0x207843, &(0x7f0000000000)={@local, @empty=[0x2], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x0, 0x0, @ipv4={[0x207835, 0x0, 0x28, 0x0, 0x6], [], @multicast2}, @mcast2={0xff, 0x4}, {[], @icmpv6=@time_exceed={0x2b, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x3f00, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 1330.750576] audit: type=1400 audit(1557215541.813:6661): avc: denied { map } for pid=4013 comm="ps" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:22 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000010b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xc, 0x1, 0x0, &(0x7f0000048000), 0x4) 07:52:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) 07:52:22 executing program 0: syz_emit_ethernet(0x207843, &(0x7f0000000000)={@local, @empty=[0x2], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x0, 0x0, @ipv4={[0x207835, 0x0, 0x28, 0x0, 0x6], [], @multicast2}, @mcast2={0xff, 0x4}, {[], @icmpv6=@time_exceed={0x2b, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x3f00, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 07:52:22 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_DEFER_SETUP(r0, 0x12, 0x7, 0x0, 0x0) [ 1331.037656] audit: type=1400 audit(1557215541.813:6662): avc: denied { map } for pid=4013 comm="ps" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:22 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000010b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xc, 0x1, 0x0, &(0x7f0000048000), 0x4) 07:52:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) [ 1331.267165] audit: type=1400 audit(1557215541.863:6663): avc: denied { map } for pid=4012 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1331.502043] audit: type=1400 audit(1557215541.863:6664): avc: denied { map } for pid=4014 comm="grep" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(r1, 0x100000001, 0x8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000080)=[{&(0x7f00000004c0)="10e73fabdc3de67605a7d82d444974e2bd26e9941980132d42a0378185b81e29e803029c60ca5b1c8038ed80d1580c78760d02b6343738e8300a8e54e355ca3d4144ad3b7bebbc1bc4d22678459ff4a8f7cc1faf5350ce4a6601b578624deb6f54cd00745b4d5e6ae8063fa45f96615da9813c9d65a539931c9bd09d4f21ef883cb27325d9ac6ef3943b5cd9edd389c53d6ee4a41f007ce55ae7", 0x9a}], 0x1, 0x0, 0x0, 0x8080}, 0x4000010) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r2 = creat(0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r5, 0x202, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}}, 0x8800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r4, r6, 0x0, 0x8000fffffffb) [ 1331.681129] audit: type=1400 audit(1557215541.863:6665): avc: denied { map } for pid=4011 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:23 executing program 0: syz_emit_ethernet(0x207843, &(0x7f0000000000)={@local, @empty=[0x2], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x0, 0x0, @ipv4={[0x207835, 0x0, 0x28, 0x0, 0x6], [], @multicast2}, @mcast2={0xff, 0x4}, {[], @icmpv6=@time_exceed={0x2b, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x3f00, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 07:52:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba000000008342f228280804f4c441a5609c8ba800000054838b") [ 1331.862880] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1331.868866] audit: audit_lost=193 audit_rate_limit=0 audit_backlog_limit=64 [ 1331.936761] audit: backlog limit exceeded 07:52:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c41730fc4223997d48f0f14e7e7018f2980dfe7df660fe7af5cc34a510804f4c441a5609c8ba800000099") socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:52:24 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000010b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xc, 0x1, 0x0, &(0x7f0000048000), 0x4) 07:52:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) 07:52:24 executing program 0: syz_emit_ethernet(0x207843, &(0x7f0000000000)={@local, @empty=[0x2], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x0, 0x0, @ipv4={[0x207835, 0x0, 0x28, 0x0, 0x6], [], @multicast2}, @mcast2={0xff, 0x4}, {[], @icmpv6=@time_exceed={0x2b, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x3f00, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 07:52:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(r1, 0x100000001, 0x8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000080)=[{&(0x7f00000004c0)="10e73fabdc3de67605a7d82d444974e2bd26e9941980132d42a0378185b81e29e803029c60ca5b1c8038ed80d1580c78760d02b6343738e8300a8e54e355ca3d4144ad3b7bebbc1bc4d22678459ff4a8f7cc1faf5350ce4a6601b578624deb6f54cd00745b4d5e6ae8063fa45f96615da9813c9d65a539931c9bd09d4f21ef883cb27325d9ac6ef3943b5cd9edd389c53d6ee4a41f007ce55ae7", 0x9a}], 0x1, 0x0, 0x0, 0x8080}, 0x4000010) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r2 = creat(0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r5, 0x202, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}}, 0x8800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r4, r6, 0x0, 0x8000fffffffb) 07:52:25 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000010b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xc, 0x1, 0x0, &(0x7f0000048000), 0x4) 07:52:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c41730fc4223997d48f0f14e7e7018f2980dfe7df660fe7af5cc34a510804f4c441a5609c8ba800000099") socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:52:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) 07:52:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4e1801c65ab39ff5bf9e2f9d70f0fcab0c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba000000008342f228280804f4c441a5609c8ba800000054838b") 07:52:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1000013, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0xf}}) 07:52:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691b869ef69dc00d9467d0680c4ab39fd5bf976f9e2c7c7e4c653fb0fc4c20593bcc50c000000b6b63af4a95ff9c441c4233d5c49cded2e48eebce0004d0080570021fcc128eac461a1f8a100000021c4e189d8a42973858e2c0f1867463bd9f2656641575adb1f7ad4350db8c122220d18c401fe5ff666450f123c167593776666430fefb3000000000004f49c14111154111d00") 07:52:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(r1, 0x100000001, 0x8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000080)=[{&(0x7f00000004c0)="10e73fabdc3de67605a7d82d444974e2bd26e9941980132d42a0378185b81e29e803029c60ca5b1c8038ed80d1580c78760d02b6343738e8300a8e54e355ca3d4144ad3b7bebbc1bc4d22678459ff4a8f7cc1faf5350ce4a6601b578624deb6f54cd00745b4d5e6ae8063fa45f96615da9813c9d65a539931c9bd09d4f21ef883cb27325d9ac6ef3943b5cd9edd389c53d6ee4a41f007ce55ae7", 0x9a}], 0x1, 0x0, 0x0, 0x8080}, 0x4000010) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r2 = creat(0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r5, 0x202, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}}, 0x8800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r4, r6, 0x0, 0x8000fffffffb) [ 1335.650261] kauditd_printk_skb: 190 callbacks suppressed [ 1335.650270] audit: type=1400 audit(1557215547.193:6856): avc: denied { map } for pid=4103 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1335.844738] audit: type=1400 audit(1557215547.243:6857): avc: denied { map } for pid=4103 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1336.032073] audit: type=1400 audit(1557215547.243:6858): avc: denied { map } for pid=4103 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1336.246464] audit: type=1400 audit(1557215547.243:6859): avc: denied { map } for pid=4103 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1336.477183] audit: type=1400 audit(1557215547.263:6860): avc: denied { map } for pid=4104 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1336.570092] audit: type=1400 audit(1557215547.263:6861): avc: denied { map } for pid=4104 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c41730fc4223997d48f0f14e7e7018f2980dfe7df660fe7af5cc34a510804f4c441a5609c8ba800000099") socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:52:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1000013, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0xf}}) 07:52:28 executing program 1: setresuid(0x0, 0xee01, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, 0x0) 07:52:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691b869ef69dc00d9467d0680c4ab39fd5bf976f9e2c7c7e4c653fb0fc4c20593bcc50c000000b6b63af4a95ff9c441c4233d5c49cded2e48eebce0004d0080570021fcc128eac461a1f8a100000021c4e189d8a42973858e2c0f1867463bd9f2656641575adb1f7ad4350db8c122220d18c401fe5ff666450f123c167593776666430fefb3000000000004f49c14111154111d00") [ 1336.688114] audit: type=1400 audit(1557215547.283:6862): avc: denied { map } for pid=4104 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(r1, 0x100000001, 0x8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000300)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000080)=[{&(0x7f00000004c0)="10e73fabdc3de67605a7d82d444974e2bd26e9941980132d42a0378185b81e29e803029c60ca5b1c8038ed80d1580c78760d02b6343738e8300a8e54e355ca3d4144ad3b7bebbc1bc4d22678459ff4a8f7cc1faf5350ce4a6601b578624deb6f54cd00745b4d5e6ae8063fa45f96615da9813c9d65a539931c9bd09d4f21ef883cb27325d9ac6ef3943b5cd9edd389c53d6ee4a41f007ce55ae7", 0x9a}], 0x1, 0x0, 0x0, 0x8080}, 0x4000010) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r2 = creat(0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r5, 0x202, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}}, 0x8800) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r4, r6, 0x0, 0x8000fffffffb) [ 1336.856480] audit: type=1400 audit(1557215547.293:6863): avc: denied { map } for pid=4103 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c41730fc4223997d48f0f14e7e7018f2980dfe7df660fe7af5cc34a510804f4c441a5609c8ba800000099") socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:52:28 executing program 1: setresuid(0x0, 0xee01, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, 0x0) 07:52:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1000013, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0xf}}) [ 1337.067383] audit: type=1400 audit(1557215547.293:6864): avc: denied { map } for pid=4104 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1337.258905] audit: type=1400 audit(1557215547.323:6865): avc: denied { map } for pid=4103 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691b869ef69dc00d9467d0680c4ab39fd5bf976f9e2c7c7e4c653fb0fc4c20593bcc50c000000b6b63af4a95ff9c441c4233d5c49cded2e48eebce0004d0080570021fcc128eac461a1f8a100000021c4e189d8a42973858e2c0f1867463bd9f2656641575adb1f7ad4350db8c122220d18c401fe5ff666450f123c167593776666430fefb3000000000004f49c14111154111d00") 07:52:29 executing program 1: setresuid(0x0, 0xee01, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, 0x0) 07:52:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1000013, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0xf}}) 07:52:30 executing program 1: setresuid(0x0, 0xee01, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, 0x0) [ 1339.040241] protocol 88fb is buggy, dev hsr_slave_0 [ 1339.045422] protocol 88fb is buggy, dev hsr_slave_1 07:52:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c41730fc4223997d48f0f14e7e7018f2980dfe7df660fe7af5cc34a510804f4c441a5609c8ba800000099") socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:52:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691b869ef69dc00d9467d0680c4ab39fd5bf976f9e2c7c7e4c653fb0fc4c20593bcc50c000000b6b63af4a95ff9c441c4233d5c49cded2e48eebce0004d0080570021fcc128eac461a1f8a100000021c4e189d8a42973858e2c0f1867463bd9f2656641575adb1f7ad4350db8c122220d18c401fe5ff666450f123c167593776666430fefb3000000000004f49c14111154111d00") 07:52:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691b869ef69dc00d9467d0680c4ab39fd5bf976f9e2c7c7e4c653fb0fc4c20593bcc50c000000b6b63af4a95ff9c441c4233d5c49cded2e48eebce0004d0080570021fcc128eac461a1f8a100000021c4e189d8a42973858e2c0f1867463bd9f2656641575adb1f7ad4350db8c122220d18c401fe5ff666450f123c167593776666430fefb3000000000004f49c14111154111d00") 07:52:31 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}, {0x2, 0x0, @local}}) getsockopt(r0, 0x114, 0x2717, 0x0, &(0x7f0000000000)) 07:52:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c41730fc4223997d48f0f14e7e7018f2980dfe7df660fe7af5cc34a510804f4c441a5609c8ba800000099") socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:52:32 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}, {0x2, 0x0, @local}}) getsockopt(r0, 0x114, 0x2717, 0x0, &(0x7f0000000000)) [ 1340.686116] kauditd_printk_skb: 139 callbacks suppressed [ 1340.686124] audit: type=1400 audit(1557215552.273:7005): avc: denied { map } for pid=4159 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1340.955319] audit: type=1400 audit(1557215552.273:7006): avc: denied { map } for pid=4159 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1341.204214] audit: type=1400 audit(1557215552.323:7007): avc: denied { map } for pid=4159 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691b869ef69dc00d9467d0680c4ab39fd5bf976f9e2c7c7e4c653fb0fc4c20593bcc50c000000b6b63af4a95ff9c441c4233d5c49cded2e48eebce0004d0080570021fcc128eac461a1f8a100000021c4e189d8a42973858e2c0f1867463bd9f2656641575adb1f7ad4350db8c122220d18c401fe5ff666450f123c167593776666430fefb3000000000004f49c14111154111d00") 07:52:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r2, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x8000001a, 0x0, 0x0, 0x1010000) 07:52:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500c42315680c56ffab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3131f4a95bf9c44144f6e68f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c0f381e2680480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 07:52:33 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}, {0x2, 0x0, @local}}) getsockopt(r0, 0x114, 0x2717, 0x0, &(0x7f0000000000)) [ 1341.608411] audit: type=1400 audit(1557215552.323:7008): avc: denied { map } for pid=4159 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1341.902511] audit: type=1400 audit(1557215552.323:7009): avc: denied { map } for pid=4159 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:33 executing program 4: unshare(0x28000000) r0 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mq_getsetattr(r0, &(0x7f0000000200)={0x800}, &(0x7f0000356000)) [ 1342.149782] audit: type=1400 audit(1557215552.383:7010): avc: denied { map } for pid=4159 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1342.422275] audit: type=1400 audit(1557215552.383:7011): avc: denied { map } for pid=4159 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1342.668866] audit: type=1400 audit(1557215552.493:7012): avc: denied { map } for pid=4159 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:34 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}, {0x2, 0x0, @local}}) getsockopt(r0, 0x114, 0x2717, 0x0, &(0x7f0000000000)) [ 1342.919264] audit: type=1400 audit(1557215552.493:7013): avc: denied { map } for pid=4159 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1343.199325] audit: type=1400 audit(1557215552.573:7014): avc: denied { map } for pid=4159 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@updsa={0x104, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in=@loopback}, {@in=@remote, 0x5000000, 0x2b}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in6=@dev}]}, 0x104}}, 0x0) 07:52:35 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000400)="2400000019001f0214f9f407112c04091c1407ed100001000a0000000900000000000000", 0x24) 07:52:35 executing program 4: unshare(0x28000000) r0 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mq_getsetattr(r0, &(0x7f0000000200)={0x800}, &(0x7f0000356000)) 07:52:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691b869ef69dc00d9467d0680c4ab39fd5bf976f9e2c7c7e4c653fb0fc4c20593bcc50c000000b6b63af4a95ff9c441c4233d5c49cded2e48eebce0004d0080570021fcc128eac461a1f8a100000021c4e189d8a42973858e2c0f1867463bd9f2656641575adb1f7ad4350db8c122220d18c401fe5ff666450f123c167593776666430fefb3000000000004f49c14111154111d00") 07:52:35 executing program 1: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x44}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:52:35 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0x43, 0x41, 0x8000000001}, 0xe) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1344.073888] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1344.184817] mip6: mip6_rthdr_init_state: spi is not 0: 5 07:52:35 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000400)="2400000019001f0214f9f407112c04091c1407ed100001000a0000000900000000000000", 0x24) 07:52:35 executing program 4: unshare(0x28000000) r0 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mq_getsetattr(r0, &(0x7f0000000200)={0x800}, &(0x7f0000356000)) 07:52:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@updsa={0x104, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in=@loopback}, {@in=@remote, 0x5000000, 0x2b}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in6=@dev}]}, 0x104}}, 0x0) 07:52:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0x43, 0x41, 0x8000000001}, 0xe) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1344.967546] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 07:52:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000380)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0f1e87014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aea460fc41100c4e189d8a42973858e2c0f186746f3400faee47e7c730f57c4619575760bc401fe5ff6e7df646736676666430fefb300000000362e41304c389cf30f1a12c4a35d0ef1ad6466660fdbad00080000") 07:52:36 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000400)="2400000019001f0214f9f407112c04091c1407ed100001000a0000000900000000000000", 0x24) [ 1345.072884] mip6: mip6_rthdr_init_state: spi is not 0: 5 07:52:36 executing program 4: unshare(0x28000000) r0 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mq_getsetattr(r0, &(0x7f0000000200)={0x800}, &(0x7f0000356000)) 07:52:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@updsa={0x104, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in=@loopback}, {@in=@remote, 0x5000000, 0x2b}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in6=@dev}]}, 0x104}}, 0x0) 07:52:37 executing program 1: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x44}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:52:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0x43, 0x41, 0x8000000001}, 0xe) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1345.761479] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1345.776049] kauditd_printk_skb: 137 callbacks suppressed [ 1345.776057] audit: type=1400 audit(1557215557.363:7152): avc: denied { map } for pid=4222 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:37 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000400)="2400000019001f0214f9f407112c04091c1407ed100001000a0000000900000000000000", 0x24) [ 1345.907512] mip6: mip6_rthdr_init_state: spi is not 0: 5 [ 1345.983555] audit: type=1400 audit(1557215557.413:7153): avc: denied { map } for pid=4222 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@updsa={0x104, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in=@loopback}, {@in=@remote, 0x5000000, 0x2b}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in6=@dev}]}, 0x104}}, 0x0) 07:52:37 executing program 4: process_vm_readv(0x0, &(0x7f0000001d40)=[{&(0x7f0000000540)=""/179, 0xb3}], 0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0xa2) [ 1346.232431] audit: type=1400 audit(1557215557.413:7154): avc: denied { map } for pid=4222 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1346.432017] audit: type=1400 audit(1557215557.473:7155): avc: denied { map } for pid=4222 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:38 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="f2af91cd807e7e0124eda133fa20430fbafce842f66188d0c23520cff556ab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a8fe9a898a837000000a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6c4a240f50ef340ae65657c7c730f80480e3833fe8f0f14e770fe5ff6c403dd7bd08c0804f4c441a5609c8ba80000005499") 07:52:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0x43, 0x41, 0x8000000001}, 0xe) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) [ 1346.642518] audit: type=1400 audit(1557215557.473:7156): avc: denied { map } for pid=4230 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1346.712998] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1346.854136] audit: type=1400 audit(1557215557.473:7157): avc: denied { map } for pid=4230 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1346.950748] mip6: mip6_rthdr_init_state: spi is not 0: 5 [ 1347.043640] audit: type=1400 audit(1557215557.493:7158): avc: denied { map } for pid=4222 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:38 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f00000001c0)="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") 07:52:38 executing program 1: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x44}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:52:38 executing program 4: process_vm_readv(0x0, &(0x7f0000001d40)=[{&(0x7f0000000540)=""/179, 0xb3}], 0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0xa2) [ 1347.246022] audit: type=1400 audit(1557215557.493:7159): avc: denied { map } for pid=4230 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:39 executing program 0: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x4020011, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x0, &(0x7f0000000100)="9f"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) 07:52:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") creat(0x0, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r1, r1, 0x0, 0x8000fffffffb) [ 1347.455297] audit: type=1400 audit(1557215557.493:7160): avc: denied { map } for pid=4230 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1347.662466] audit: type=1400 audit(1557215557.543:7161): avc: denied { map } for pid=4231 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:39 executing program 4: process_vm_readv(0x0, &(0x7f0000001d40)=[{&(0x7f0000000540)=""/179, 0xb3}], 0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0xa2) [ 1348.112963] binder: release 4261:4273 transaction 38 out, still active [ 1348.142306] binder: undelivered TRANSACTION_COMPLETE 07:52:39 executing program 0: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x4020011, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x0, &(0x7f0000000100)="9f"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) 07:52:39 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="f2af91cd807e7e0124eda133fa20430fbafce842f66188d0c23520cff556ab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a8fe9a898a837000000a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6c4a240f50ef340ae65657c7c730f80480e3833fe8f0f14e770fe5ff6c403dd7bd08c0804f4c441a5609c8ba80000005499") [ 1348.278988] binder: release 4261:4266 transaction 38 in, still active [ 1348.293018] binder: send failed reply for transaction 38, target dead 07:52:40 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f00000001c0)="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") 07:52:40 executing program 1: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x44}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:52:40 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f00000001c0)="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") 07:52:40 executing program 4: process_vm_readv(0x0, &(0x7f0000001d40)=[{&(0x7f0000000540)=""/179, 0xb3}], 0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0xa2) [ 1349.349981] binder: release 4285:4294 transaction 40 out, still active [ 1349.374888] binder: undelivered TRANSACTION_COMPLETE 07:52:41 executing program 0: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x4020011, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x0, &(0x7f0000000100)="9f"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) [ 1349.437082] binder: release 4285:4290 transaction 40 in, still active [ 1349.458036] binder: send failed reply for transaction 40, target dead 07:52:41 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="f2af91cd807e7e0124eda133fa20430fbafce842f66188d0c23520cff556ab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a8fe9a898a837000000a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6c4a240f50ef340ae65657c7c730f80480e3833fe8f0f14e770fe5ff6c403dd7bd08c0804f4c441a5609c8ba80000005499") 07:52:41 executing program 4: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x4020011, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x0, &(0x7f0000000100)="9f"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) 07:52:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x145042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffff9) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') [ 1350.791628] kauditd_printk_skb: 191 callbacks suppressed [ 1350.791636] audit: type=1400 audit(1557215562.333:7344): avc: denied { call } for pid=4305 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 1350.802693] binder: release 4305:4310 transaction 42 out, still active 07:52:42 executing program 0: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x4020011, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x0, &(0x7f0000000100)="9f"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) [ 1350.986622] binder_alloc: 4305: binder_alloc_buf, no vma [ 1351.013754] binder: undelivered TRANSACTION_COMPLETE [ 1351.023627] audit: type=1400 audit(1557215562.453:7345): avc: denied { map } for pid=4307 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1351.054675] binder: 4308:4311 transaction failed 29189/-3, size 0-0 line 2917 [ 1351.062466] binder: release 4305:4306 transaction 42 in, still active [ 1351.123065] binder: send failed reply for transaction 42, target dead 07:52:42 executing program 4: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x4020011, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x0, &(0x7f0000000100)="9f"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) [ 1351.227145] audit: type=1400 audit(1557215562.503:7346): avc: denied { map } for pid=4307 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1351.232938] binder: undelivered TRANSACTION_ERROR: 29189 07:52:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) [ 1351.461568] audit: type=1400 audit(1557215562.533:7347): avc: denied { map } for pid=4307 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1351.683793] audit: type=1400 audit(1557215562.573:7348): avc: denied { call } for pid=4308 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 07:52:43 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="f2af91cd807e7e0124eda133fa20430fbafce842f66188d0c23520cff556ab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a8fe9a898a837000000a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe6c4a240f50ef340ae65657c7c730f80480e3833fe8f0f14e770fe5ff6c403dd7bd08c0804f4c441a5609c8ba80000005499") [ 1351.894660] audit: type=1400 audit(1557215562.583:7349): avc: denied { map } for pid=4307 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1352.019408] binder: release 4318:4319 transaction 45 out, still active [ 1352.038395] binder: undelivered TRANSACTION_COMPLETE [ 1352.116499] binder: send failed reply for transaction 45, target dead [ 1352.150842] audit: type=1400 audit(1557215562.583:7350): avc: denied { map } for pid=4307 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:43 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f00000001c0)="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") 07:52:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") creat(0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="b13691cd806969ef69dc00d942c6c0da38c4ab39fd5bf9e2f9e2c7c7e4c652fb0fc401160db63a3a3e646765400f01d0c4c2719104128f4808eebce00000802000c46521fc51c1c1eac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c6636f3440fe6db5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) [ 1352.233201] binder: 4323:4325 transaction failed 29189/-22, size 0-0 line 2802 [ 1352.295389] binder: undelivered TRANSACTION_ERROR: 29189 [ 1352.349810] audit: type=1400 audit(1557215562.673:7351): avc: denied { map } for pid=4313 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4), 0x1c) sendmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a00)=ANY=[@ANYBLOB="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"], 0x24c0}}], 0x1, 0x0) 07:52:44 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f00000001c0)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56eabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c08fe978e125001000020f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa646808cb0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") 07:52:44 executing program 4: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x4020011, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x0, &(0x7f0000000100)="9f"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) [ 1352.571338] audit: type=1400 audit(1557215562.683:7353): avc: denied { map } for pid=4307 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1352.751477] audit: type=1400 audit(1557215562.683:7354): avc: denied { map } for pid=4307 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4), 0x1c) sendmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a00)=ANY=[@ANYBLOB="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"], 0x24c0}}], 0x1, 0x0) [ 1353.250246] binder: release 4336:4347 transaction 48 out, still active [ 1353.257149] binder: undelivered TRANSACTION_COMPLETE 07:52:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r1, 0x40046104, 0x70c003) [ 1353.356502] binder: release 4336:4342 transaction 48 in, still active [ 1353.417597] binder: send failed reply for transaction 48, target dead 07:52:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500f5f5c4ab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c730f80480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 07:52:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4), 0x1c) sendmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a00)=ANY=[@ANYBLOB="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"], 0x24c0}}], 0x1, 0x0) 07:52:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r1, 0x40046104, 0x70c003) 07:52:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4), 0x1c) sendmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a00)=ANY=[@ANYBLOB="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"], 0x24c0}}], 0x1, 0x0) 07:52:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r1, 0x40046104, 0x70c003) 07:52:47 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f00000001c0)="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") 07:52:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500f5f5c4ab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c730f80480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 07:52:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") creat(0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="b13691cd806969ef69dc00d942c6c0da38c4ab39fd5bf9e2f9e2c7c7e4c652fb0fc401160db63a3a3e646765400f01d0c4c2719104128f4808eebce00000802000c46521fc51c1c1eac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c6636f3440fe6db5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) [ 1355.904480] kauditd_printk_skb: 114 callbacks suppressed [ 1355.904489] audit: type=1400 audit(1557215567.493:7468): avc: denied { map } for pid=4372 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1356.129744] audit: type=1400 audit(1557215567.583:7469): avc: denied { map } for pid=4372 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:47 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fb0e2762e014cb63a38a95ff9c44149f216c421fc51c12aea01efc48192558dc3c3664545a318b34646c27d0fb3c442dd8e1100007c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12856394c4a141d2e8") syz_execute_func(&(0x7f00000001c0)="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") 07:52:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") creat(0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="b13691cd806969ef69dc00d942c6c0da38c4ab39fd5bf9e2f9e2c7c7e4c652fb0fc401160db63a3a3e646765400f01d0c4c2719104128f4808eebce00000802000c46521fc51c1c1eac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c6636f3440fe6db5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) 07:52:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r1, 0x40046104, 0x70c003) [ 1356.364453] audit: type=1400 audit(1557215567.583:7470): avc: denied { map } for pid=4372 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1356.603578] audit: type=1400 audit(1557215567.583:7471): avc: denied { map } for pid=4372 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1356.865068] audit: type=1400 audit(1557215567.593:7472): avc: denied { map } for pid=4373 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500f5f5c4ab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c730f80480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") [ 1357.114873] audit: type=1400 audit(1557215567.603:7473): avc: denied { map } for pid=4373 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:48 executing program 4: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}]}]}, 0x44}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1357.486105] audit: type=1400 audit(1557215567.623:7474): avc: denied { map } for pid=4373 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1357.817131] audit: type=1400 audit(1557215567.643:7475): avc: denied { map } for pid=4373 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:49 executing program 3: unshare(0x24020400) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 1358.097132] audit: type=1400 audit(1557215567.693:7476): avc: denied { map } for pid=4372 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1358.257453] audit: audit_backlog=65 > audit_backlog_limit=64 07:52:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) 07:52:50 executing program 3: unshare(0x24020400) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 07:52:50 executing program 4: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}]}]}, 0x44}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:52:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") creat(0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="b13691cd806969ef69dc00d942c6c0da38c4ab39fd5bf9e2f9e2c7c7e4c652fb0fc401160db63a3a3e646765400f01d0c4c2719104128f4808eebce00000802000c46521fc51c1c1eac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c6636f3440fe6db5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) 07:52:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000100)=""/42, 0x225}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfd15}], 0xc7, 0x0) 07:52:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") creat(0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="b13691cd806969ef69dc00d942c6c0da38c4ab39fd5bf9e2f9e2c7c7e4c652fb0fc401160db63a3a3e646765400f01d0c4c2719104128f4808eebce00000802000c46521fc51c1c1eac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c6636f3440fe6db5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) 07:52:51 executing program 3: unshare(0x24020400) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 07:52:52 executing program 3: unshare(0x24020400) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 07:52:52 executing program 4: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}]}]}, 0x44}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:52:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c23500f5f5c4ab39fd5bf9e2f9470f1d1497c7e4c65849dbc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340ae65657c7c730f80480e3833fe8f0f14e7e701fe5ff6e7df0804f4c441a5609c8ba80000005499") 07:52:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{0x0}, {&(0x7f0000002200)=""/66, 0x42}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003ac0)=""/4, 0x4}], 0x1}, 0x8}, {{0x0, 0x0, &(0x7f0000006ec0)=[{0x0}], 0x1, &(0x7f0000006f00)=""/245, 0xf5, 0x1000}, 0x5}], 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) [ 1361.455757] kauditd_printk_skb: 163 callbacks suppressed [ 1361.455765] audit: type=1400 audit(1557215573.043:7626): avc: denied { map } for pid=4438 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x3e, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) [ 1361.648135] audit: type=1400 audit(1557215573.093:7627): avc: denied { map } for pid=4438 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1361.838643] audit: type=1400 audit(1557215573.113:7628): avc: denied { map } for pid=4438 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1362.082138] audit: type=1400 audit(1557215573.123:7629): avc: denied { map } for pid=4438 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1362.303367] audit: type=1400 audit(1557215573.173:7630): avc: denied { map } for pid=4438 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1362.493907] audit: type=1400 audit(1557215573.173:7631): avc: denied { map } for pid=4441 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:54 executing program 2: syz_execute_func(&(0x7f00000000c0)="0c15c4817a2df998cd801b69e4af6962f5696200d9d9d00f0fbb7d000000aef2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4da7676c5f2168f4808eebce00000802000c4c3dd6d68074851518fe9509b9b9bfc0000c1ea01eff265dc5f00c35b5b45363ef80f9966030faee42c240f5e5bf447000026400f0d18c401fe5ff6e3df4d01c36666450f17720d14119119d354111d00") 07:52:54 executing program 4: sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}]}]}, 0x44}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:52:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x3e, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) [ 1362.649745] audit: type=1400 audit(1557215573.203:7632): avc: denied { map } for pid=4441 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1362.878291] audit: type=1400 audit(1557215573.203:7633): avc: denied { map } for pid=4438 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") creat(0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="b13691cd806969ef69dc00d942c6c0da38c4ab39fd5bf9e2f9e2c7c7e4c652fb0fc401160db63a3a3e646765400f01d0c4c2719104128f4808eebce00000802000c46521fc51c1c1eac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c6636f3440fe6db5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) [ 1363.062448] audit: type=1400 audit(1557215573.203:7634): avc: denied { map } for pid=4438 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1363.299389] audit: type=1400 audit(1557215573.223:7635): avc: denied { map } for pid=4441 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") creat(0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="b13691cd806969ef69dc00d942c6c0da38c4ab39fd5bf9e2f9e2c7c7e4c652fb0fc401160db63a3a3e646765400f01d0c4c2719104128f4808eebce00000802000c46521fc51c1c1eac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c6636f3440fe6db5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) 07:52:55 executing program 2: syz_execute_func(&(0x7f00000000c0)="0c15c4817a2df998cd801b69e4af6962f5696200d9d9d00f0fbb7d000000aef2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4da7676c5f2168f4808eebce00000802000c4c3dd6d68074851518fe9509b9b9bfc0000c1ea01eff265dc5f00c35b5b45363ef80f9966030faee42c240f5e5bf447000026400f0d18c401fe5ff6e3df4d01c36666450f17720d14119119d354111d00") 07:52:55 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{0x0}, {&(0x7f0000002200)=""/66, 0x42}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003ac0)=""/4, 0x4}], 0x1}, 0x8}, {{0x0, 0x0, &(0x7f0000006ec0)=[{0x0}], 0x1, &(0x7f0000006f00)=""/245, 0xf5, 0x1000}, 0x5}], 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 07:52:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x3e, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) 07:52:55 executing program 4: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{0x0}, {&(0x7f0000002200)=""/66, 0x42}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003ac0)=""/4, 0x4}], 0x1}, 0x8}, {{0x0, 0x0, &(0x7f0000006ec0)=[{0x0}], 0x1, &(0x7f0000006f00)=""/245, 0xf5, 0x1000}, 0x5}], 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 07:52:55 executing program 2: syz_execute_func(&(0x7f00000000c0)="0c15c4817a2df998cd801b69e4af6962f5696200d9d9d00f0fbb7d000000aef2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4da7676c5f2168f4808eebce00000802000c4c3dd6d68074851518fe9509b9b9bfc0000c1ea01eff265dc5f00c35b5b45363ef80f9966030faee42c240f5e5bf447000026400f0d18c401fe5ff6e3df4d01c36666450f17720d14119119d354111d00") 07:52:56 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{0x0}, {&(0x7f0000002200)=""/66, 0x42}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003ac0)=""/4, 0x4}], 0x1}, 0x8}, {{0x0, 0x0, &(0x7f0000006ec0)=[{0x0}], 0x1, &(0x7f0000006f00)=""/245, 0xf5, 0x1000}, 0x5}], 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 07:52:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x3e, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) 07:52:56 executing program 2: syz_execute_func(&(0x7f00000000c0)="0c15c4817a2df998cd801b69e4af6962f5696200d9d9d00f0fbb7d000000aef2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4da7676c5f2168f4808eebce00000802000c4c3dd6d68074851518fe9509b9b9bfc0000c1ea01eff265dc5f00c35b5b45363ef80f9966030faee42c240f5e5bf447000026400f0d18c401fe5ff6e3df4d01c36666450f17720d14119119d354111d00") 07:52:56 executing program 4: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{0x0}, {&(0x7f0000002200)=""/66, 0x42}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003ac0)=""/4, 0x4}], 0x1}, 0x8}, {{0x0, 0x0, &(0x7f0000006ec0)=[{0x0}], 0x1, &(0x7f0000006f00)=""/245, 0xf5, 0x1000}, 0x5}], 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 07:52:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x48}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1366.495563] kauditd_printk_skb: 154 callbacks suppressed [ 1366.495572] audit: type=1400 audit(1557215578.083:7790): avc: denied { map } for pid=4501 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:58 executing program 1: syz_execute_func(&(0x7f0000000300)="915d420d29d0f05a5aab4b4be2f9c4e1f573df3da0ed287fc10000000026430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccdc4e37d099300000100b24eaf673e0facce48510000009664660fdaf0458004ea00660f50e38f691801ae0c000000") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") [ 1366.710204] audit: type=1400 audit(1557215578.083:7791): avc: denied { map } for pid=4501 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1366.850085] audit: type=1400 audit(1557215578.163:7792): avc: denied { map } for pid=4501 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:58 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{0x0}, {&(0x7f0000002200)=""/66, 0x42}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003ac0)=""/4, 0x4}], 0x1}, 0x8}, {{0x0, 0x0, &(0x7f0000006ec0)=[{0x0}], 0x1, &(0x7f0000006f00)=""/245, 0xf5, 0x1000}, 0x5}], 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 07:52:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x48}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:52:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) pause() sendfile(r1, r1, 0x0, 0x8000fffffffb) [ 1367.051284] audit: type=1400 audit(1557215578.163:7793): avc: denied { map } for pid=4501 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:58 executing program 4: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{0x0}, {&(0x7f0000002200)=""/66, 0x42}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003ac0)=""/4, 0x4}], 0x1}, 0x8}, {{0x0, 0x0, &(0x7f0000006ec0)=[{0x0}], 0x1, &(0x7f0000006f00)=""/245, 0xf5, 0x1000}, 0x5}], 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 07:52:58 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000005c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x4}) [ 1367.239334] audit: type=1400 audit(1557215578.183:7794): avc: denied { map } for pid=3995 comm="ifup" path="/sbin/ifup" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:59 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x40a42, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/33, 0x21}], 0x1) syz_execute_func(&(0x7f0000000000)="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") [ 1367.456634] audit: type=1400 audit(1557215578.213:7795): avc: denied { map } for pid=3995 comm="ifup" path="/sbin/ifup" dev="sda1" ino=16080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1367.625669] audit: type=1400 audit(1557215578.243:7796): avc: denied { map } for pid=3995 comm="ifup" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1367.839090] audit: type=1400 audit(1557215578.243:7797): avc: denied { map } for pid=3995 comm="ifup" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:59 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000005c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x4}) [ 1368.027066] audit: type=1400 audit(1557215578.253:7798): avc: denied { map } for pid=4503 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:52:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) pause() sendfile(r1, r1, 0x0, 0x8000fffffffb) 07:52:59 executing program 4: syz_execute_func(&(0x7f0000000540)="f2aa0442052eab5b4b4b7df92e660f3a62dbfb38b0aa0400002fc6f347c4226d4044698826430fe85d00660f41e50a0aaa23878d973adebd973adebd0fec38c422f93f2478c4e1796ff46736676666430fefb3000000000804f44eafc4e2799a9300000000250f60d7d7f36d11110000646891a23e79f0832c89fe792431e37979470f72f17c660fd9a215b4d5dc89e9f347360f38110f381143114a9178036c3e6666643a41e12e66450f2e4e1b417d6f1636f0f69000000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 07:52:59 executing program 1: syz_execute_func(&(0x7f0000000300)="915d420d29d0f05a5aab4b4be2f9c4e1f573df3da0ed287fc10000000026430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccdc4e37d099300000100b24eaf673e0facce48510000009664660fdaf0458004ea00660f50e38f691801ae0c000000") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") [ 1368.239969] audit: type=1400 audit(1557215578.253:7799): avc: denied { map } for pid=4503 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x48}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:53:00 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x40a42, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/33, 0x21}], 0x1) syz_execute_func(&(0x7f0000000000)="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") 07:53:00 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000005c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x4}) 07:53:00 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000005c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x4}) 07:53:01 executing program 4: syz_execute_func(&(0x7f0000000540)="f2aa0442052eab5b4b4b7df92e660f3a62dbfb38b0aa0400002fc6f347c4226d4044698826430fe85d00660f41e50a0aaa23878d973adebd973adebd0fec38c422f93f2478c4e1796ff46736676666430fefb3000000000804f44eafc4e2799a9300000000250f60d7d7f36d11110000646891a23e79f0832c89fe792431e37979470f72f17c660fd9a215b4d5dc89e9f347360f38110f381143114a9178036c3e6666643a41e12e66450f2e4e1b417d6f1636f0f69000000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 07:53:01 executing program 1: syz_execute_func(&(0x7f0000000300)="915d420d29d0f05a5aab4b4be2f9c4e1f573df3da0ed287fc10000000026430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccdc4e37d099300000100b24eaf673e0facce48510000009664660fdaf0458004ea00660f50e38f691801ae0c000000") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") 07:53:01 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x40a42, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/33, 0x21}], 0x1) syz_execute_func(&(0x7f0000000000)="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") 07:53:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x48}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:53:01 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x40a42, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/33, 0x21}], 0x1) syz_execute_func(&(0x7f0000000000)="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") [ 1371.742648] kauditd_printk_skb: 186 callbacks suppressed [ 1371.742656] audit: type=1400 audit(1557215583.333:7977): avc: denied { map } for pid=4593 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) pause() sendfile(r1, r1, 0x0, 0x8000fffffffb) 07:53:03 executing program 1: syz_execute_func(&(0x7f0000000300)="915d420d29d0f05a5aab4b4be2f9c4e1f573df3da0ed287fc10000000026430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccdc4e37d099300000100b24eaf673e0facce48510000009664660fdaf0458004ea00660f50e38f691801ae0c000000") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x10000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") 07:53:03 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x40a42, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/33, 0x21}], 0x1) syz_execute_func(&(0x7f0000000000)="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") 07:53:03 executing program 4: syz_execute_func(&(0x7f0000000540)="f2aa0442052eab5b4b4b7df92e660f3a62dbfb38b0aa0400002fc6f347c4226d4044698826430fe85d00660f41e50a0aaa23878d973adebd973adebd0fec38c422f93f2478c4e1796ff46736676666430fefb3000000000804f44eafc4e2799a9300000000250f60d7d7f36d11110000646891a23e79f0832c89fe792431e37979470f72f17c660fd9a215b4d5dc89e9f347360f38110f381143114a9178036c3e6666643a41e12e66450f2e4e1b417d6f1636f0f69000000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 07:53:03 executing program 3: syz_execute_func(&(0x7f0000000300)="915d420d29d0f05a5aab4b4be2f9c4e1f573df3da0ed287fc10000000026430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccdc4e37d099300000100b24eaf673e0facce48510000009664660fdaf0458004ea00660f50e38f691801ae0c000000") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") 07:53:03 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x40a42, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/33, 0x21}], 0x1) syz_execute_func(&(0x7f0000000000)="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") [ 1371.870083] audit: type=1400 audit(1557215583.333:7978): avc: denied { map } for pid=4593 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1372.046989] audit: type=1400 audit(1557215583.333:7979): avc: denied { map } for pid=4593 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1372.288588] audit: type=1400 audit(1557215583.333:7980): avc: denied { map } for pid=4593 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1372.508626] audit: type=1400 audit(1557215583.393:7981): avc: denied { map } for pid=4594 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1372.668902] audit: type=1400 audit(1557215583.393:7982): avc: denied { map } for pid=4594 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1372.867484] audit: type=1400 audit(1557215583.403:7983): avc: denied { map } for pid=4594 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:04 executing program 3: syz_execute_func(&(0x7f0000000300)="915d420d29d0f05a5aab4b4be2f9c4e1f573df3da0ed287fc10000000026430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccdc4e37d099300000100b24eaf673e0facce48510000009664660fdaf0458004ea00660f50e38f691801ae0c000000") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") 07:53:04 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x40a42, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/33, 0x21}], 0x1) syz_execute_func(&(0x7f0000000000)="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") 07:53:04 executing program 4: syz_execute_func(&(0x7f0000000540)="f2aa0442052eab5b4b4b7df92e660f3a62dbfb38b0aa0400002fc6f347c4226d4044698826430fe85d00660f41e50a0aaa23878d973adebd973adebd0fec38c422f93f2478c4e1796ff46736676666430fefb3000000000804f44eafc4e2799a9300000000250f60d7d7f36d11110000646891a23e79f0832c89fe792431e37979470f72f17c660fd9a215b4d5dc89e9f347360f38110f381143114a9178036c3e6666643a41e12e66450f2e4e1b417d6f1636f0f69000000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") [ 1373.019426] audit: type=1400 audit(1557215583.403:7984): avc: denied { map } for pid=4594 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1373.162241] audit: type=1400 audit(1557215583.413:7986): avc: denied { map } for pid=4593 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1373.316484] audit: type=1400 audit(1557215583.433:7987): avc: denied { map } for pid=4593 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002e80)=0x214, 0x4) sendto$inet(r2, &(0x7f0000000100)="02", 0x1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2002) 07:53:05 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x3d, 0x40000000, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1", 0x1f0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0xee649bb5afe29a8b, 0x0) sendfile(r2, r3, 0x0, 0x10000) 07:53:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000300)="f259af6544813f00000000c4e1c65d2f0f0124eda133fa20c481a964c952f7619bd0c4ab5bf9e2f9d9ea0f982408f0410fabb200000000c441a253ac0a0000008052db6dc463f91756bd53f749f2168f4808ee208c46d9f34580d1b153817a6fe60f186746f340ae7c730f66400f66420f383259e0fe8f0f14e7e7e4a1305577410fefa900000000f6e7dfc441a5609c8ba80000005499") 07:53:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) pause() sendfile(r1, r1, 0x0, 0x8000fffffffb) 07:53:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000540)="a6", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cddd846f1bcd822043e190dd1f40e64d998a1e1a6d17297f5b7907f446019b0bb495f8ef97d636318db1eb25a44fdb7d8d14fc6b6f6650e11e2a12be4fab45e5c933da483b6cdf814b92003f5bf7344e80c23e37770853b24b8cb86c923292938961d92811a54b51c2ccf5d6f21f59e84a2d5c939df3c968d293689075d4e2588fb1329e17fe", 0xd1, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 07:53:06 executing program 3: syz_execute_func(&(0x7f0000000300)="915d420d29d0f05a5aab4b4be2f9c4e1f573df3da0ed287fc10000000026430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccdc4e37d099300000100b24eaf673e0facce48510000009664660fdaf0458004ea00660f50e38f691801ae0c000000") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") 07:53:06 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) socket$key(0xf, 0x3, 0x2) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@initdev, @in=@empty}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, 0x0, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000200)='./file0\x00') r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000c80)={0x8, "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", 0x1000}, 0x1006) sendfile(r1, r1, &(0x7f0000d83ff8), 0x2008000fffffffe) 07:53:06 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x3d, 0x40000000, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r2, &(0x7f0000000400)="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", 0x1f0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0xee649bb5afe29a8b, 0x0) sendfile(r2, r3, 0x0, 0x10000) 07:53:06 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(0x0, 0x100000005c5002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="bc15da193f6bec925f47e20d10707b67", 0x10) syz_execute_func(&(0x7f0000000080)="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") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r2, 0x900, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@dev, @local}, 0x0) request_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='/dev/ppp\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000240)={{0x8, 0x7, 0x7, 0x1, 0xffffffffffffffc1, 0x20}, 0x7, 0x80, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:53:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000300)="f259af6544813f00000000c4e1c65d2f0f0124eda133fa20c481a964c952f7619bd0c4ab5bf9e2f9d9ea0f982408f0410fabb200000000c441a253ac0a0000008052db6dc463f91756bd53f749f2168f4808ee208c46d9f34580d1b153817a6fe60f186746f340ae7c730f66400f66420f383259e0fe8f0f14e7e7e4a1305577410fefa900000000f6e7dfc441a5609c8ba80000005499") 07:53:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000540)="a6", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cddd846f1bcd822043e190dd1f40e64d998a1e1a6d17297f5b7907f446019b0bb495f8ef97d636318db1eb25a44fdb7d8d14fc6b6f6650e11e2a12be4fab45e5c933da483b6cdf814b92003f5bf7344e80c23e37770853b24b8cb86c923292938961d92811a54b51c2ccf5d6f21f59e84a2d5c939df3c968d293689075d4e2588fb1329e17fe", 0xd1, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 07:53:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x3d, 0x40000000, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r2, &(0x7f0000000400)="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", 0x1f0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0xee649bb5afe29a8b, 0x0) sendfile(r2, r3, 0x0, 0x10000) 07:53:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 07:53:08 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(0x0, 0x100000005c5002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="bc15da193f6bec925f47e20d10707b67", 0x10) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf000c4000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r2, 0x900, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@dev, @local}, 0x0) request_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='/dev/ppp\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000240)={{0x8, 0x7, 0x7, 0x1, 0xffffffffffffffc1, 0x20}, 0x7, 0x80, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1376.758486] kauditd_printk_skb: 201 callbacks suppressed [ 1376.758495] audit: type=1400 audit(1557215588.343:8188): avc: denied { map } for pid=4696 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) [ 1376.968493] audit: type=1400 audit(1557215588.353:8189): avc: denied { map } for pid=4692 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1377.139669] audit: type=1400 audit(1557215588.353:8190): avc: denied { map } for pid=4696 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000300)="f259af6544813f00000000c4e1c65d2f0f0124eda133fa20c481a964c952f7619bd0c4ab5bf9e2f9d9ea0f982408f0410fabb200000000c441a253ac0a0000008052db6dc463f91756bd53f749f2168f4808ee208c46d9f34580d1b153817a6fe60f186746f340ae7c730f66400f66420f383259e0fe8f0f14e7e7e4a1305577410fefa900000000f6e7dfc441a5609c8ba80000005499") 07:53:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x3d, 0x40000000, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r2, &(0x7f0000000400)="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", 0x1f0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0xee649bb5afe29a8b, 0x0) sendfile(r2, r3, 0x0, 0x10000) [ 1377.324293] audit: type=1400 audit(1557215588.363:8191): avc: denied { map } for pid=4696 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1377.432557] audit: type=1400 audit(1557215588.363:8192): avc: denied { map } for pid=4698 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1377.620481] audit: type=1400 audit(1557215588.363:8193): avc: denied { map } for pid=4696 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1377.789128] audit: type=1400 audit(1557215588.363:8194): avc: denied { map } for pid=4692 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1378.015039] audit: type=1400 audit(1557215588.363:8195): avc: denied { map } for pid=4698 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000540)="a6", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cddd846f1bcd822043e190dd1f40e64d998a1e1a6d17297f5b7907f446019b0bb495f8ef97d636318db1eb25a44fdb7d8d14fc6b6f6650e11e2a12be4fab45e5c933da483b6cdf814b92003f5bf7344e80c23e37770853b24b8cb86c923292938961d92811a54b51c2ccf5d6f21f59e84a2d5c939df3c968d293689075d4e2588fb1329e17fe", 0xd1, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 07:53:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 07:53:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) [ 1378.201661] audit: type=1400 audit(1557215588.373:8196): avc: denied { map } for pid=4692 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1378.377958] audit: audit_backlog=65 > audit_backlog_limit=64 07:53:10 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(0x0, 0x100000005c5002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="bc15da193f6bec925f47e20d10707b67", 0x10) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf000c4000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r2, 0x900, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@dev, @local}, 0x0) request_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='/dev/ppp\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000240)={{0x8, 0x7, 0x7, 0x1, 0xffffffffffffffc1, 0x20}, 0x7, 0x80, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:53:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 07:53:10 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(0x0, 0x100000005c5002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="bc15da193f6bec925f47e20d10707b67", 0x10) syz_execute_func(&(0x7f0000000080)="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") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r2, 0x900, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@dev, @local}, 0x0) request_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='/dev/ppp\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000240)={{0x8, 0x7, 0x7, 0x1, 0xffffffffffffffc1, 0x20}, 0x7, 0x80, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:53:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000300)="f259af6544813f00000000c4e1c65d2f0f0124eda133fa20c481a964c952f7619bd0c4ab5bf9e2f9d9ea0f982408f0410fabb200000000c441a253ac0a0000008052db6dc463f91756bd53f749f2168f4808ee208c46d9f34580d1b153817a6fe60f186746f340ae7c730f66400f66420f383259e0fe8f0f14e7e7e4a1305577410fefa900000000f6e7dfc441a5609c8ba80000005499") 07:53:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 07:53:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000540)="a6", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cddd846f1bcd822043e190dd1f40e64d998a1e1a6d17297f5b7907f446019b0bb495f8ef97d636318db1eb25a44fdb7d8d14fc6b6f6650e11e2a12be4fab45e5c933da483b6cdf814b92003f5bf7344e80c23e37770853b24b8cb86c923292938961d92811a54b51c2ccf5d6f21f59e84a2d5c939df3c968d293689075d4e2588fb1329e17fe", 0xd1, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 07:53:11 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(0x0, 0x100000005c5002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="bc15da193f6bec925f47e20d10707b67", 0x10) syz_execute_func(&(0x7f0000000080)="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") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r2, 0x900, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@dev, @local}, 0x0) request_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='/dev/ppp\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000240)={{0x8, 0x7, 0x7, 0x1, 0xffffffffffffffc1, 0x20}, 0x7, 0x80, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:53:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 07:53:11 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(0x0, 0x100000005c5002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="bc15da193f6bec925f47e20d10707b67", 0x10) syz_execute_func(&(0x7f0000000080)="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") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r2, 0x900, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@dev, @local}, 0x0) request_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='/dev/ppp\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000240)={{0x8, 0x7, 0x7, 0x1, 0xffffffffffffffc1, 0x20}, 0x7, 0x80, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:53:11 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(0x0, 0x100000005c5002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="bc15da193f6bec925f47e20d10707b67", 0x10) syz_execute_func(&(0x7f0000000080)="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") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r2, 0x900, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@dev, @local}, 0x0) request_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='/dev/ppp\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000240)={{0x8, 0x7, 0x7, 0x1, 0xffffffffffffffc1, 0x20}, 0x7, 0x80, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:53:12 executing program 3: syz_execute_func(&(0x7f0000001400)="64f34135a09d000091417ecc5a5aab5b4b4be2f9e2c7a0ed287fc1000000243a26430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d66410f51e4660f383ccd646736676666430fefb3000000000804f4fd12fd12151a86a7510000410fbfad09000000364a221400c403e15c4300c28f691801ae0c000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 07:53:12 executing program 1: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000dc0)="c4a17b2dd04a2ae926470fc1ee42980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56ea670f5ca200000000000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fc1e59898bec42104ca67f30fedb21678760078760058428e42c4e10bf8d4c421eb5daadc0000008fe978e12500100002662fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f2c441fc28349d00000100a1a12ad764d3cf53afc421b1f56af38466f27ac4423d9f9346000000660f79cead768a8a9294d80200492f2d8f0b10016f1010a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb34aa646808cb0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3c1c401fe70580869553131b83a00a2b0fbaf8f28709f6d0047") 07:53:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="b13691cd806969ef69dc00d9d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aea01efc48192558dc3c366450f186746f3400faee47c7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") mkdir(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfffffef6) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/136, 0x88}], 0x1) 07:53:12 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(0x0, 0x100000005c5002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="bc15da193f6bec925f47e20d10707b67", 0x10) syz_execute_func(&(0x7f0000000080)="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") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r2, 0x900, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@dev, @local}, 0x0) request_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='/dev/ppp\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000240)={{0x8, 0x7, 0x7, 0x1, 0xffffffffffffffc1, 0x20}, 0x7, 0x80, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:53:13 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(0x0, 0x100000005c5002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="bc15da193f6bec925f47e20d10707b67", 0x10) syz_execute_func(&(0x7f0000000080)="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") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r2, 0x900, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@dev, @local}, 0x0) request_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='/dev/ppp\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000240)={{0x8, 0x7, 0x7, 0x1, 0xffffffffffffffc1, 0x20}, 0x7, 0x80, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:53:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xb) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 1381.765377] kauditd_printk_skb: 231 callbacks suppressed [ 1381.765386] audit: type=1400 audit(1557215593.353:8420): avc: denied { map } for pid=4782 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1381.946902] audit: type=1400 audit(1557215593.403:8421): avc: denied { map } for pid=4780 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:13 executing program 3: syz_execute_func(&(0x7f0000001400)="64f34135a09d000091417ecc5a5aab5b4b4be2f9e2c7a0ed287fc1000000243a26430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d66410f51e4660f383ccd646736676666430fefb3000000000804f4fd12fd12151a86a7510000410fbfad09000000364a221400c403e15c4300c28f691801ae0c000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") [ 1382.197315] audit: type=1400 audit(1557215593.423:8422): avc: denied { map } for pid=4783 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:13 executing program 1: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000dc0)="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") [ 1382.422120] audit: type=1400 audit(1557215593.423:8423): avc: denied { map } for pid=4780 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:14 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(0x0, 0x100000005c5002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="bc15da193f6bec925f47e20d10707b67", 0x10) syz_execute_func(&(0x7f0000000080)="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") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r2, 0x900, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@dev, @local}, 0x0) request_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='/dev/ppp\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000240)={{0x8, 0x7, 0x7, 0x1, 0xffffffffffffffc1, 0x20}, 0x7, 0x80, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:53:14 executing program 0: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000dc0)="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") [ 1382.676661] audit: type=1400 audit(1557215593.433:8424): avc: denied { map } for pid=4782 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1382.887247] audit: type=1400 audit(1557215593.443:8425): avc: denied { map } for pid=4783 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x7) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x28, 0x0, @thr={&(0x7f0000000480)="91c89d2e5e9899caa9bc2e109f6d55b97a1bbacaf00a01f45fb8a5d67ce5b13fad79dfd0055ffcd88537f6fd49250399de32985ecc05469a8b6891ff0fca28dfca4251ce8814021397fcf45a2115711b0f7c0bd9badd0dbd1e3a7d44df145cc4bd0d37b17495b3e7db0780299acf3dfcb018c04408737d8a34711491c84888d0201a276ac61a2aef80e6633a4febbd2c7b6099c843cfe7da9410cf7d578751903a05014f8ea8f73b363aaa918f9222cd3c3379df52f1606b6c3ab4918a84b2a28f01b63c6fd69d1119f5feef5ff14b1588eae348117dc5750e436c94446a3cbf261439d89292728a73523da5d2c83f390722754b9a8be22b", 0x0}}, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) chown(0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) [ 1383.112045] audit: type=1400 audit(1557215593.453:8426): avc: denied { map } for pid=4782 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1383.339918] audit: type=1400 audit(1557215593.453:8427): avc: denied { map } for pid=4783 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1383.515612] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1383.530986] audit: audit_backlog=65 > audit_backlog_limit=64 07:53:15 executing program 3: syz_execute_func(&(0x7f0000001400)="64f34135a09d000091417ecc5a5aab5b4b4be2f9e2c7a0ed287fc1000000243a26430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d66410f51e4660f383ccd646736676666430fefb3000000000804f4fd12fd12151a86a7510000410fbfad09000000364a221400c403e15c4300c28f691801ae0c000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 07:53:15 executing program 1: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000dc0)="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") 07:53:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="b13622cdc4a2552d1fab39fd5bf9e2f9c401256536c4014cb63a3af4a95ff9c44149f216360f00049ac40290046eeb8383d001ef3e2626660f3adfae182ca9e556f342d8f1f3410faee47c7c45f729571b1b42699da89ab90000c401fe5ff6e7df646736676666430fefb3000000004b4b04f4f30f1a1254410f8e00000000") [ 1384.579168] overlayfs: upperdir is in-use by another mount, mount with '-o index=off' to override exclusive upperdir protection. 07:53:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x7) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x28, 0x0, @thr={&(0x7f0000000480)="91c89d2e5e9899caa9bc2e109f6d55b97a1bbacaf00a01f45fb8a5d67ce5b13fad79dfd0055ffcd88537f6fd49250399de32985ecc05469a8b6891ff0fca28dfca4251ce8814021397fcf45a2115711b0f7c0bd9badd0dbd1e3a7d44df145cc4bd0d37b17495b3e7db0780299acf3dfcb018c04408737d8a34711491c84888d0201a276ac61a2aef80e6633a4febbd2c7b6099c843cfe7da9410cf7d578751903a05014f8ea8f73b363aaa918f9222cd3c3379df52f1606b6c3ab4918a84b2a28f01b63c6fd69d1119f5feef5ff14b1588eae348117dc5750e436c94446a3cbf261439d89292728a73523da5d2c83f390722754b9a8be22b", 0x0}}, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) chown(0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) 07:53:16 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xb) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 07:53:17 executing program 3: syz_execute_func(&(0x7f0000001400)="64f34135a09d000091417ecc5a5aab5b4b4be2f9e2c7a0ed287fc1000000243a26430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d66410f51e4660f383ccd646736676666430fefb3000000000804f4fd12fd12151a86a7510000410fbfad09000000364a221400c403e15c4300c28f691801ae0c000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 07:53:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="b13622cdc4a2552d1fab39fd5bf9e2f9c401256536c4014cb63a3af4a95ff9c44149f216360f00049ac40290046eeb8383d001ef3e2626660f3adfae182ca9e556f342d8f1f3410faee47c7c45f729571b1b42699da89ab90000c401fe5ff6e7df646736676666430fefb3000000004b4b04f4f30f1a1254410f8e00000000") 07:53:17 executing program 1: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000dc0)="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") 07:53:18 executing program 0: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000dc0)="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") [ 1386.778588] kauditd_printk_skb: 182 callbacks suppressed [ 1386.778597] audit: type=1400 audit(1557215598.363:8603): avc: denied { map } for pid=4855 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xb) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 07:53:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x7) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x28, 0x0, @thr={&(0x7f0000000480)="91c89d2e5e9899caa9bc2e109f6d55b97a1bbacaf00a01f45fb8a5d67ce5b13fad79dfd0055ffcd88537f6fd49250399de32985ecc05469a8b6891ff0fca28dfca4251ce8814021397fcf45a2115711b0f7c0bd9badd0dbd1e3a7d44df145cc4bd0d37b17495b3e7db0780299acf3dfcb018c04408737d8a34711491c84888d0201a276ac61a2aef80e6633a4febbd2c7b6099c843cfe7da9410cf7d578751903a05014f8ea8f73b363aaa918f9222cd3c3379df52f1606b6c3ab4918a84b2a28f01b63c6fd69d1119f5feef5ff14b1588eae348117dc5750e436c94446a3cbf261439d89292728a73523da5d2c83f390722754b9a8be22b", 0x0}}, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) chown(0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) [ 1387.031128] audit: type=1400 audit(1557215598.383:8604): avc: denied { map } for pid=4852 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1387.238872] audit: type=1400 audit(1557215598.383:8605): avc: denied { map } for pid=4852 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="b13622cdc4a2552d1fab39fd5bf9e2f9c401256536c4014cb63a3af4a95ff9c44149f216360f00049ac40290046eeb8383d001ef3e2626660f3adfae182ca9e556f342d8f1f3410faee47c7c45f729571b1b42699da89ab90000c401fe5ff6e7df646736676666430fefb3000000004b4b04f4f30f1a1254410f8e00000000") [ 1387.442566] audit: type=1400 audit(1557215598.443:8606): avc: denied { map } for pid=4855 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1387.604072] audit: type=1400 audit(1557215598.483:8607): avc: denied { map } for pid=4855 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1387.794962] audit: type=1400 audit(1557215598.493:8608): avc: denied { map } for pid=4855 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1387.965613] audit: type=1400 audit(1557215598.543:8609): avc: denied { map } for pid=4855 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x7) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x28, 0x0, @thr={&(0x7f0000000480)="91c89d2e5e9899caa9bc2e109f6d55b97a1bbacaf00a01f45fb8a5d67ce5b13fad79dfd0055ffcd88537f6fd49250399de32985ecc05469a8b6891ff0fca28dfca4251ce8814021397fcf45a2115711b0f7c0bd9badd0dbd1e3a7d44df145cc4bd0d37b17495b3e7db0780299acf3dfcb018c04408737d8a34711491c84888d0201a276ac61a2aef80e6633a4febbd2c7b6099c843cfe7da9410cf7d578751903a05014f8ea8f73b363aaa918f9222cd3c3379df52f1606b6c3ab4918a84b2a28f01b63c6fd69d1119f5feef5ff14b1588eae348117dc5750e436c94446a3cbf261439d89292728a73523da5d2c83f390722754b9a8be22b", 0x0}}, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) chown(0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) 07:53:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xb) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 1388.207777] audit: type=1400 audit(1557215598.553:8610): avc: denied { map } for pid=4855 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1388.412884] audit: type=1400 audit(1557215598.613:8611): avc: denied { map } for pid=4855 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:20 executing program 0: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441f2a68f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c00f0dae1b4999ebc443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000dc0)="c4a17b2dd04a2ae926470fc1ee42980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56ea670f5ca200000000000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fc1e59898bec42104ca67f30fedb21678760078760058428e42c4e10bf8d4c421eb5daadc0000008fe978e12500100002662fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f2c441fc28349d00000100a1a12ad764d3cf53afc421b1f56af38466f27ac4423d9f9346000000660f79cead768a8a9294d80200492f2d8f0b10016f1010a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb34aa646808cb0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3c1c401fe70580869553131b83a00a2b0fbaf8f28709f6d0047") [ 1388.570341] audit: type=1400 audit(1557215598.653:8612): avc: denied { map } for pid=4855 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="b13622cdc4a2552d1fab39fd5bf9e2f9c401256536c4014cb63a3af4a95ff9c44149f216360f00049ac40290046eeb8383d001ef3e2626660f3adfae182ca9e556f342d8f1f3410faee47c7c45f729571b1b42699da89ab90000c401fe5ff6e7df646736676666430fefb3000000004b4b04f4f30f1a1254410f8e00000000") 07:53:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x7) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x28, 0x0, @thr={&(0x7f0000000480)="91c89d2e5e9899caa9bc2e109f6d55b97a1bbacaf00a01f45fb8a5d67ce5b13fad79dfd0055ffcd88537f6fd49250399de32985ecc05469a8b6891ff0fca28dfca4251ce8814021397fcf45a2115711b0f7c0bd9badd0dbd1e3a7d44df145cc4bd0d37b17495b3e7db0780299acf3dfcb018c04408737d8a34711491c84888d0201a276ac61a2aef80e6633a4febbd2c7b6099c843cfe7da9410cf7d578751903a05014f8ea8f73b363aaa918f9222cd3c3379df52f1606b6c3ab4918a84b2a28f01b63c6fd69d1119f5feef5ff14b1588eae348117dc5750e436c94446a3cbf261439d89292728a73523da5d2c83f390722754b9a8be22b", 0x0}}, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) chown(0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) 07:53:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x7) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x28, 0x0, @thr={&(0x7f0000000480)="91c89d2e5e9899caa9bc2e109f6d55b97a1bbacaf00a01f45fb8a5d67ce5b13fad79dfd0055ffcd88537f6fd49250399de32985ecc05469a8b6891ff0fca28dfca4251ce8814021397fcf45a2115711b0f7c0bd9badd0dbd1e3a7d44df145cc4bd0d37b17495b3e7db0780299acf3dfcb018c04408737d8a34711491c84888d0201a276ac61a2aef80e6633a4febbd2c7b6099c843cfe7da9410cf7d578751903a05014f8ea8f73b363aaa918f9222cd3c3379df52f1606b6c3ab4918a84b2a28f01b63c6fd69d1119f5feef5ff14b1588eae348117dc5750e436c94446a3cbf261439d89292728a73523da5d2c83f390722754b9a8be22b", 0x0}}, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) chown(0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) 07:53:21 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xb) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 07:53:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x20}}, 0x0) syz_execute_func(&(0x7f00000001c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aec44201461f41730fc4223997d48f0f14e78fc403850fd5fe0fe7af5cc34a510804f4c441a5609c8ba800000099") 07:53:22 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x81) ioctl$int_in(r0, 0x80000080045017, &(0x7f0000000140)) 07:53:22 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xb) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 07:53:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x9, 0x0, &(0x7f0000000100)) close(r2) close(r1) 07:53:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x7) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x28, 0x0, @thr={&(0x7f0000000480)="91c89d2e5e9899caa9bc2e109f6d55b97a1bbacaf00a01f45fb8a5d67ce5b13fad79dfd0055ffcd88537f6fd49250399de32985ecc05469a8b6891ff0fca28dfca4251ce8814021397fcf45a2115711b0f7c0bd9badd0dbd1e3a7d44df145cc4bd0d37b17495b3e7db0780299acf3dfcb018c04408737d8a34711491c84888d0201a276ac61a2aef80e6633a4febbd2c7b6099c843cfe7da9410cf7d578751903a05014f8ea8f73b363aaa918f9222cd3c3379df52f1606b6c3ab4918a84b2a28f01b63c6fd69d1119f5feef5ff14b1588eae348117dc5750e436c94446a3cbf261439d89292728a73523da5d2c83f390722754b9a8be22b", 0x0}}, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) faccessat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) chown(0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) 07:53:23 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x81) ioctl$int_in(r0, 0x80000080045017, &(0x7f0000000140)) [ 1391.784460] kauditd_printk_skb: 155 callbacks suppressed [ 1391.784468] audit: type=1400 audit(1557215603.373:8768): avc: denied { map } for pid=4909 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1391.971777] audit: type=1400 audit(1557215603.413:8769): avc: denied { map } for pid=4909 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x20}}, 0x0) syz_execute_func(&(0x7f00000001c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aec44201461f41730fc4223997d48f0f14e78fc403850fd5fe0fe7af5cc34a510804f4c441a5609c8ba800000099") 07:53:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000100)=@ethtool_gfeatures}) close(r2) close(r1) 07:53:23 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x81) ioctl$int_in(r0, 0x80000080045017, &(0x7f0000000140)) [ 1392.185640] audit: type=1400 audit(1557215603.433:8770): avc: denied { map } for pid=4907 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1392.362953] audit: type=1400 audit(1557215603.433:8771): avc: denied { map } for pid=4907 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1392.558117] audit: type=1400 audit(1557215603.443:8772): avc: denied { map } for pid=4909 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xb) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 1392.705205] audit: type=1400 audit(1557215603.463:8773): avc: denied { map } for pid=4909 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:24 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x81) ioctl$int_in(r0, 0x80000080045017, &(0x7f0000000140)) [ 1392.878140] audit: type=1400 audit(1557215603.503:8774): avc: denied { map } for pid=4909 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)={[{@fat=@nocase='nocase'}]}) 07:53:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x57e, 0x4) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) [ 1393.104596] audit: type=1400 audit(1557215603.523:8775): avc: denied { map } for pid=4909 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1393.276456] audit: type=1400 audit(1557215603.563:8776): avc: denied { map } for pid=4909 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1393.442524] audit: type=1400 audit(1557215603.563:8777): avc: denied { map } for pid=4909 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x20}}, 0x0) syz_execute_func(&(0x7f00000001c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aec44201461f41730fc4223997d48f0f14e78fc403850fd5fe0fe7af5cc34a510804f4c441a5609c8ba800000099") [ 1393.646189] FAT-fs (loop5): bogus number of reserved sectors [ 1393.688107] FAT-fs (loop5): Can't find a valid FAT filesystem 07:53:25 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:53:25 executing program 5: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441400f4c458a8f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c05726400f0d18c443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000001c0)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56eabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c08fe978e125001000020f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa646808cb0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") r2 = open(&(0x7f0000000000)='./file0\x00', 0x121000, 0x8c) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000000c0)={0x5, 0x7, 0x8, 0xf23b}) 07:53:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x57e, 0x4) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 07:53:25 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) keyctl$revoke(0x3, r0) 07:53:26 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x4010ae68, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000300)=0x14) 07:53:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x60}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:53:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x57e, 0x4) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 07:53:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x57e, 0x4) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 07:53:27 executing program 5: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441400f4c458a8f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c05726400f0d18c443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000001c0)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56eabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c08fe978e125001000020f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa646808cb0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") r2 = open(&(0x7f0000000000)='./file0\x00', 0x121000, 0x8c) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000000c0)={0x5, 0x7, 0x8, 0xf23b}) 07:53:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x20}}, 0x0) syz_execute_func(&(0x7f00000001c0)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e6c74e4ee4c653fb0fc4e94cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aec44201461f41730fc4223997d48f0f14e78fc403850fd5fe0fe7af5cc34a510804f4c441a5609c8ba800000099") 07:53:27 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x4010ae68, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000300)=0x14) 07:53:27 executing program 3: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441400f4c458a8f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c05726400f0d18c443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000001c0)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56eabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c08fe978e125001000020f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa646808cb0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") r2 = open(&(0x7f0000000000)='./file0\x00', 0x121000, 0x8c) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000000c0)={0x5, 0x7, 0x8, 0xf23b}) 07:53:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x60}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:53:27 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x4010ae68, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000300)=0x14) 07:53:28 executing program 1: getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1396.790743] kauditd_printk_skb: 191 callbacks suppressed [ 1396.790751] audit: type=1400 audit(1557215608.383:8969): avc: denied { map } for pid=5002 comm="net.agent" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:28 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) [ 1397.046714] audit: type=1400 audit(1557215608.383:8970): avc: denied { map } for pid=4999 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1397.301376] audit: type=1400 audit(1557215608.383:8971): avc: denied { map } for pid=5003 comm="ps" path="/lib/x86_64-linux-gnu/libprocps.so.0.0.1" dev="sda1" ino=2725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1397.667281] audit: type=1400 audit(1557215608.383:8972): avc: denied { map } for pid=5003 comm="ps" path="/lib/x86_64-linux-gnu/libprocps.so.0.0.1" dev="sda1" ino=2725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:29 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x4010ae68, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000300)=0x14) [ 1397.938871] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1397.942136] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1397.961002] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1397.996819] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1398.042294] audit: audit_lost=211 audit_rate_limit=0 audit_backlog_limit=64 [ 1398.047159] audit: audit_lost=212 audit_rate_limit=0 audit_backlog_limit=64 07:53:29 executing program 1: getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) 07:53:30 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) 07:53:30 executing program 5: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441400f4c458a8f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c05726400f0d18c443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000001c0)="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") r2 = open(&(0x7f0000000000)='./file0\x00', 0x121000, 0x8c) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000000c0)={0x5, 0x7, 0x8, 0xf23b}) 07:53:31 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) 07:53:31 executing program 1: getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) 07:53:31 executing program 3: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441400f4c458a8f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c05726400f0d18c443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000001c0)="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") r2 = open(&(0x7f0000000000)='./file0\x00', 0x121000, 0x8c) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000000c0)={0x5, 0x7, 0x8, 0xf23b}) 07:53:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x60}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:53:32 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) 07:53:32 executing program 1: getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) 07:53:32 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) 07:53:32 executing program 5: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441400f4c458a8f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c05726400f0d18c443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000001c0)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebc4a249dc56eabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c08fe978e125001000020f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa646808cb0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") r2 = open(&(0x7f0000000000)='./file0\x00', 0x121000, 0x8c) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000000c0)={0x5, 0x7, 0x8, 0xf23b}) [ 1401.872314] kauditd_printk_skb: 276 callbacks suppressed [ 1401.872323] audit: type=1400 audit(1557215613.463:9240): avc: denied { map } for pid=5090 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1402.244914] audit: type=1400 audit(1557215613.463:9241): avc: denied { map } for pid=5090 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1402.632889] audit: type=1400 audit(1557215613.503:9242): avc: denied { map } for pid=5090 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:34 executing program 1: getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) 07:53:34 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) [ 1403.023299] audit: type=1400 audit(1557215613.503:9243): avc: denied { map } for pid=5090 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:35 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) [ 1403.359318] audit: type=1400 audit(1557215613.633:9244): avc: denied { map } for pid=5090 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:35 executing program 3: syz_execute_func(&(0x7f0000000140)="b036916969ef69dc00d9d0d05a2eab5bf9e2f9e2c7f7f7e4c653fb0fc4014c243a26430f381caad7000000a95ff9c441400f4c458a8f4808eebce00000802000c483fd086600a7c1c1ea01efc48192558dc3c36645d3c05726400f0d18c443496f99a1a0000005e7df646736676666430fefb3000000000804f44e0f1a10ebeb8fc848969c4a0400000004") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000001c0)="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") r2 = open(&(0x7f0000000000)='./file0\x00', 0x121000, 0x8c) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000000c0)={0x5, 0x7, 0x8, 0xf23b}) [ 1403.666839] audit: type=1400 audit(1557215613.643:9245): avc: denied { map } for pid=5091 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1403.959532] audit: type=1400 audit(1557215613.683:9246): avc: denied { map } for pid=5091 comm="ps" path="/bin/ps" dev="sda1" ino=1477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x60}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1404.234276] audit: type=1400 audit(1557215613.713:9247): avc: denied { map } for pid=5090 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:35 executing program 1: getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1404.425661] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1404.435171] audit: audit_backlog=65 > audit_backlog_limit=64 07:53:36 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c1241319bd070") fchownat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff, 0x1000) 07:53:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045004, &(0x7f0000000000)) 07:53:37 executing program 1: getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) 07:53:37 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) open(0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) prctl$PR_GET_FP_MODE(0x2e) read(r0, &(0x7f0000000380)=""/165, 0xffdc) 07:53:37 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c1241319bd070") fchownat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff, 0x1000) 07:53:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r2, 0x0) mlock(&(0x7f0000004000/0x4000)=nil, 0x4000) mlock(&(0x7f0000003000/0x3000)=nil, 0x3000) 07:53:38 executing program 5: syz_execute_func(&(0x7f0000001300)="b0b691420d29d0d05a2eab4b4be2f9c4e1f573df3da0ed287fc100000000243a26430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccd646736676666430fefb3000000000804f44eaf151a86a72e673e0facce48510000009664660fda364a22140000008f691801ae0c000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") 07:53:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000000140)="2400000024007f5bffff9e0000007701000000ff010000000000028af1ffffff0100ff10", 0x24) [ 1406.898948] kauditd_printk_skb: 114 callbacks suppressed [ 1406.898957] audit: type=1400 audit(1557215618.483:9355): avc: denied { map } for pid=5145 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:38 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f00009b1ffc)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, 0x0) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) tkill(r0, 0x1000000000016) [ 1407.239506] audit: type=1400 audit(1557215618.583:9356): avc: denied { map } for pid=5147 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:38 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) open(0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) prctl$PR_GET_FP_MODE(0x2e) read(r0, &(0x7f0000000380)=""/165, 0xffdc) 07:53:39 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c1241319bd070") fchownat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff, 0x1000) [ 1407.552417] audit: type=1400 audit(1557215618.583:9357): avc: denied { map } for pid=5147 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:39 executing program 5: syz_execute_func(&(0x7f0000001300)="b0b691420d29d0d05a2eab4b4be2f9c4e1f573df3da0ed287fc100000000243a26430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccd646736676666430fefb3000000000804f44eaf151a86a72e673e0facce48510000009664660fda364a22140000008f691801ae0c000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") 07:53:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000000140)="2400000024007f5bffff9e0000007701000000ff010000000000028af1ffffff0100ff10", 0x24) 07:53:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) open(0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) prctl$PR_GET_FP_MODE(0x2e) read(r0, &(0x7f0000000380)=""/165, 0xffdc) [ 1407.848670] audit: type=1400 audit(1557215618.593:9358): avc: denied { map } for pid=5145 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1408.170161] audit: type=1400 audit(1557215618.623:9359): avc: denied { map } for pid=5145 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1408.382455] audit: type=1400 audit(1557215618.723:9360): avc: denied { map } for pid=5145 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1408.667982] audit: type=1400 audit(1557215618.723:9361): avc: denied { map } for pid=5145 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:40 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c1241319bd070") fchownat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff, 0x1000) 07:53:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000000140)="2400000024007f5bffff9e0000007701000000ff010000000000028af1ffffff0100ff10", 0x24) 07:53:40 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) open(0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) prctl$PR_GET_FP_MODE(0x2e) read(r0, &(0x7f0000000380)=""/165, 0xffdc) 07:53:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) open(0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) prctl$PR_GET_FP_MODE(0x2e) read(r0, &(0x7f0000000380)=""/165, 0xffdc) [ 1408.994790] audit: type=1400 audit(1557215618.733:9362): avc: denied { map } for pid=5147 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:40 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f00009b1ffc)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, 0x0) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) tkill(r0, 0x1000000000016) [ 1409.278074] audit: type=1400 audit(1557215618.733:9363): avc: denied { map } for pid=5147 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:41 executing program 5: syz_execute_func(&(0x7f0000001300)="b0b691420d29d0d05a2eab4b4be2f9c4e1f573df3da0ed287fc100000000243a26430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccd646736676666430fefb3000000000804f44eaf151a86a72e673e0facce48510000009664660fda364a22140000008f691801ae0c000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") [ 1409.565622] audit: audit_backlog=65 > audit_backlog_limit=64 07:53:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000000140)="2400000024007f5bffff9e0000007701000000ff010000000000028af1ffffff0100ff10", 0x24) 07:53:41 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x18}) r1 = userfaultfd(0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x600000)=nil, 0x602000, 0x4) dup2(r1, r0) 07:53:42 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) open(0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) prctl$PR_GET_FP_MODE(0x2e) read(r0, &(0x7f0000000380)=""/165, 0xffdc) 07:53:42 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f00009b1ffc)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, 0x0) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) tkill(r0, 0x1000000000016) 07:53:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) open(0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) prctl$PR_GET_FP_MODE(0x2e) read(r0, &(0x7f0000000380)=""/165, 0xffdc) 07:53:43 executing program 2: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="a9ee55e6efc355b5d84579e1e0581cc25f19e348ceb89b33bd33da13f96bbe0dcc630a821b80d3d0a483a8c5f29797398c28dbc85610dbb0af30258f767edff6d7b5a45e8ffa59734a1a82f440b46595ea85a27c19429df8ac14fd8c", 0x5c, 0xfffffffffffffff9) keyctl$update(0x2, r0, &(0x7f00000014c0)="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", 0xc4c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xffffffffffffff70) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r2 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$input_event(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffb) 07:53:43 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x18}) r1 = userfaultfd(0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x600000)=nil, 0x602000, 0x4) dup2(r1, r0) 07:53:43 executing program 5: syz_execute_func(&(0x7f0000001300)="b0b691420d29d0d05a2eab4b4be2f9c4e1f573df3da0ed287fc100000000243a26430f381caad70000000f18c68f4808eebce000002000c46600a7c1c1ea01922626440fec380f0fab167311eca626400f0d1866410f51e4660f383ccd646736676666430fefb3000000000804f44eaf151a86a72e673e0facce48510000009664660fda364a22140000008f691801ae0c000000") r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") [ 1412.037461] kauditd_printk_skb: 134 callbacks suppressed [ 1412.037470] audit: type=1400 audit(1557215623.623:9496): avc: denied { map } for pid=5222 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1412.323590] audit: type=1400 audit(1557215623.713:9497): avc: denied { map } for pid=5223 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1412.620240] audit: type=1400 audit(1557215623.713:9498): avc: denied { map } for pid=5223 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:44 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8, 0x84001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x20002, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) listen(0xffffffffffffffff, 0x8000000000006) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x101400, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000240)={0xa, 0x2, 0x7, 0xcd8a}, 0xa) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000180)="157d348c39355ad077427742b08374b73cc66f536c0c6d2c0836a8da417636af5b74b1d1a0b34d70d8f81317d1ab04a62788e591cf2af603cd7c10e4ffe910d35b6e69bce0daceef4ce9733e78c12cbec1e6c3385166c6") sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) r4 = semget(0x0, 0x3, 0x10) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000540)=[0x1000, 0x3, 0xd2e3, 0xbc6, 0x8, 0xe04, 0x1201, 0x100000000, 0x3, 0x5]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000580)) listen(r3, 0x9) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xb4, r5, 0x328, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) 07:53:44 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x18}) r1 = userfaultfd(0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x600000)=nil, 0x602000, 0x4) dup2(r1, r0) [ 1413.050973] audit: type=1400 audit(1557215623.743:9499): avc: denied { map } for pid=5222 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:44 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f00009b1ffc)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x77359400}, 0x0) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) tkill(r0, 0x1000000000016) 07:53:44 executing program 2: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="a9ee55e6efc355b5d84579e1e0581cc25f19e348ceb89b33bd33da13f96bbe0dcc630a821b80d3d0a483a8c5f29797398c28dbc85610dbb0af30258f767edff6d7b5a45e8ffa59734a1a82f440b46595ea85a27c19429df8ac14fd8c", 0x5c, 0xfffffffffffffff9) keyctl$update(0x2, r0, &(0x7f00000014c0)="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", 0xc4c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xffffffffffffff70) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r2 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$input_event(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffb) [ 1413.371448] audit: type=1400 audit(1557215623.743:9500): avc: denied { map } for pid=5222 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1413.493507] audit: audit_backlog=65 > audit_backlog_limit=64 07:53:45 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'vxcan1\x00', 0x200}) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) close(r2) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0xfffffffffffffffe, @dev}, {0x2, 0x0, @remote}, {0x2, 0x4e1c, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x800000000, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x33) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) unshare(0x800) socket$inet_tcp(0x2, 0x1, 0x0) flistxattr(r0, &(0x7f00000005c0)=""/189, 0xbd) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000240)={0x2d, 0x0, 0xb, 0x1a, 0x6, 0x6, 0x1, 0x76}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001080)) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) [ 1413.535637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1413.571580] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1413.577439] audit: audit_lost=220 audit_rate_limit=0 audit_backlog_limit=64 [ 1413.630085] audit: audit_lost=221 audit_rate_limit=0 audit_backlog_limit=64 07:53:46 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x18}) r1 = userfaultfd(0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x600000)=nil, 0x602000, 0x4) dup2(r1, r0) 07:53:46 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8, 0x84001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x20002, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) listen(0xffffffffffffffff, 0x8000000000006) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x101400, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000240)={0xa, 0x2, 0x7, 0xcd8a}, 0xa) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000180)="157d348c39355ad077427742b08374b73cc66f536c0c6d2c0836a8da417636af5b74b1d1a0b34d70d8f81317d1ab04a62788e591cf2af603cd7c10e4ffe910d35b6e69bce0daceef4ce9733e78c12cbec1e6c3385166c6") sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) r4 = semget(0x0, 0x3, 0x10) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000540)=[0x1000, 0x3, 0xd2e3, 0xbc6, 0x8, 0xe04, 0x1201, 0x100000000, 0x3, 0x5]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000580)) listen(r3, 0x9) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xb4, r5, 0x328, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) 07:53:46 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x84) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8, 0x84001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x20002, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) listen(0xffffffffffffffff, 0x8000000000006) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x101400, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000240)={0xa, 0x2, 0x7, 0xcd8a}, 0xa) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000180)="157d348c39355ad077427742b08374b73cc66f536c0c6d2c0836a8da417636af5b74b1d1a0b34d70d8f81317d1ab04a62788e591cf2af603cd7c10e4ffe910d35b6e69bce0daceef4ce9733e78c12cbec1e6c3385166c6") sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) r4 = semget(0x0, 0x3, 0x10) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000540)=[0x1000, 0x3, 0xd2e3, 0xbc6, 0x8, 0xe04, 0x1201, 0x100000000, 0x3, 0x5]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000580)) listen(r3, 0x9) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xb4, r5, 0x328, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) 07:53:47 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'vxcan1\x00', 0x200}) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) close(r2) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0xfffffffffffffffe, @dev}, {0x2, 0x0, @remote}, {0x2, 0x4e1c, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x800000000, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x33) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) unshare(0x800) socket$inet_tcp(0x2, 0x1, 0x0) flistxattr(r0, &(0x7f00000005c0)=""/189, 0xbd) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000240)={0x2d, 0x0, 0xb, 0x1a, 0x6, 0x6, 0x1, 0x76}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001080)) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) 07:53:47 executing program 2: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="a9ee55e6efc355b5d84579e1e0581cc25f19e348ceb89b33bd33da13f96bbe0dcc630a821b80d3d0a483a8c5f29797398c28dbc85610dbb0af30258f767edff6d7b5a45e8ffa59734a1a82f440b46595ea85a27c19429df8ac14fd8c", 0x5c, 0xfffffffffffffff9) keyctl$update(0x2, r0, &(0x7f00000014c0)="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", 0xc4c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xffffffffffffff70) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r2 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$input_event(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffb) 07:53:47 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8, 0x84001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x20002, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) listen(0xffffffffffffffff, 0x8000000000006) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x101400, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000240)={0xa, 0x2, 0x7, 0xcd8a}, 0xa) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000180)="157d348c39355ad077427742b08374b73cc66f536c0c6d2c0836a8da417636af5b74b1d1a0b34d70d8f81317d1ab04a62788e591cf2af603cd7c10e4ffe910d35b6e69bce0daceef4ce9733e78c12cbec1e6c3385166c6") sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) r4 = semget(0x0, 0x3, 0x10) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000540)=[0x1000, 0x3, 0xd2e3, 0xbc6, 0x8, 0xe04, 0x1201, 0x100000000, 0x3, 0x5]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000580)) listen(r3, 0x9) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xb4, r5, 0x328, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) 07:53:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="b13491cd806969ef69dc00d9c4a2d1920cec1402ab39fd5bf9e2f9b315c7e4c653fb0fc4014cb63a3af4a95ff9c44159da164f01ccc421fc51c1c461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18420ffb17dedfdf6736676666430fefb300000000c4428500dcf30f1a1254114d54111d00") syz_execute_func(&(0x7f0000000100)="c4a17b2dd04a2ae92ca842980f050d427ce444c4a37bf0c50241e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e02000000110f9a8f698099005ba265aa104b06660f38091e2fdee5bebec42104ca67f30fedb216787600787600584243c4e10bf8d4d9c08fe978e125001000020f66420fc443ed0ed000c423c96cb83d000000fe2e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afc421b1f56af38466f2abc4423d9f9346000000660f79cead768a8a9294d80200490f2d8f0b000000c2a0c10b00ccf0498785000000000d6572d33c6436b2aa66450fc46500000f01f9c441c05983f9070bb3ddcd4aa646808cb0159517f4dcc481c5f89780000000c483d94848f24b7d7526802d08000000fa67f243a75c450f91f3dac9c401fe70580869553131b83a00a2b0fbaf3b62") 07:53:48 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8, 0x84001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x20002, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) listen(0xffffffffffffffff, 0x8000000000006) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x101400, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000240)={0xa, 0x2, 0x7, 0xcd8a}, 0xa) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000180)="157d348c39355ad077427742b08374b73cc66f536c0c6d2c0836a8da417636af5b74b1d1a0b34d70d8f81317d1ab04a62788e591cf2af603cd7c10e4ffe910d35b6e69bce0daceef4ce9733e78c12cbec1e6c3385166c6") sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) r4 = semget(0x0, 0x3, 0x10) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000540)=[0x1000, 0x3, 0xd2e3, 0xbc6, 0x8, 0xe04, 0x1201, 0x100000000, 0x3, 0x5]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000580)) listen(r3, 0x9) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xb4, r5, 0x328, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) [ 1417.132924] kauditd_printk_skb: 168 callbacks suppressed [ 1417.132932] audit: type=1400 audit(1557215628.723:9662): avc: denied { map } for pid=5290 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:48 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x84) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8, 0x84001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x20002, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) listen(0xffffffffffffffff, 0x8000000000006) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x101400, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000240)={0xa, 0x2, 0x7, 0xcd8a}, 0xa) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000180)="157d348c39355ad077427742b08374b73cc66f536c0c6d2c0836a8da417636af5b74b1d1a0b34d70d8f81317d1ab04a62788e591cf2af603cd7c10e4ffe910d35b6e69bce0daceef4ce9733e78c12cbec1e6c3385166c6") sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) r4 = semget(0x0, 0x3, 0x10) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000540)=[0x1000, 0x3, 0xd2e3, 0xbc6, 0x8, 0xe04, 0x1201, 0x100000000, 0x3, 0x5]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000580)) listen(r3, 0x9) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xb4, r5, 0x328, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) 07:53:48 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'vxcan1\x00', 0x200}) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) close(r2) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0xfffffffffffffffe, @dev}, {0x2, 0x0, @remote}, {0x2, 0x4e1c, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x800000000, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x33) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) unshare(0x800) socket$inet_tcp(0x2, 0x1, 0x0) flistxattr(r0, &(0x7f00000005c0)=""/189, 0xbd) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000240)={0x2d, 0x0, 0xb, 0x1a, 0x6, 0x6, 0x1, 0x76}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001080)) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) [ 1417.530186] audit: type=1400 audit(1557215628.773:9663): avc: denied { map } for pid=5297 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="b13491cd806969ef69dc00d9c4a2d1920cec1402ab39fd5bf9e2f9b315c7e4c653fb0fc4014cb63a3af4a95ff9c44159da164f01ccc421fc51c1c461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18420ffb17dedfdf6736676666430fefb300000000c4428500dcf30f1a1254114d54111d00") syz_execute_func(&(0x7f0000000100)="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") [ 1417.842279] audit: type=1400 audit(1557215628.803:9664): avc: denied { map } for pid=5290 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:49 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8, 0x84001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x20002, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) listen(0xffffffffffffffff, 0x8000000000006) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x101400, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000240)={0xa, 0x2, 0x7, 0xcd8a}, 0xa) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000180)="157d348c39355ad077427742b08374b73cc66f536c0c6d2c0836a8da417636af5b74b1d1a0b34d70d8f81317d1ab04a62788e591cf2af603cd7c10e4ffe910d35b6e69bce0daceef4ce9733e78c12cbec1e6c3385166c6") sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) r4 = semget(0x0, 0x3, 0x10) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000540)=[0x1000, 0x3, 0xd2e3, 0xbc6, 0x8, 0xe04, 0x1201, 0x100000000, 0x3, 0x5]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000580)) listen(r3, 0x9) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xb4, r5, 0x328, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) [ 1418.147590] audit: type=1400 audit(1557215628.813:9665): avc: denied { map } for pid=5297 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1418.457436] audit: type=1400 audit(1557215628.863:9666): avc: denied { map } for pid=5297 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1418.885061] audit: type=1400 audit(1557215628.863:9667): avc: denied { map } for pid=5297 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:50 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'vxcan1\x00', 0x200}) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) close(r2) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0xfffffffffffffffe, @dev}, {0x2, 0x0, @remote}, {0x2, 0x4e1c, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x800000000, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x33) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) unshare(0x800) socket$inet_tcp(0x2, 0x1, 0x0) flistxattr(r0, &(0x7f00000005c0)=""/189, 0xbd) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000240)={0x2d, 0x0, 0xb, 0x1a, 0x6, 0x6, 0x1, 0x76}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001080)) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) [ 1419.146551] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1419.149152] audit: audit_backlog=65 > audit_backlog_limit=64 07:53:50 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8, 0x84001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x20002, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) listen(0xffffffffffffffff, 0x8000000000006) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x101400, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000240)={0xa, 0x2, 0x7, 0xcd8a}, 0xa) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000180)="157d348c39355ad077427742b08374b73cc66f536c0c6d2c0836a8da417636af5b74b1d1a0b34d70d8f81317d1ab04a62788e591cf2af603cd7c10e4ffe910d35b6e69bce0daceef4ce9733e78c12cbec1e6c3385166c6") sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) r4 = semget(0x0, 0x3, 0x10) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000540)=[0x1000, 0x3, 0xd2e3, 0xbc6, 0x8, 0xe04, 0x1201, 0x100000000, 0x3, 0x5]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000580)) listen(r3, 0x9) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xb4, r5, 0x328, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) [ 1419.213344] audit: audit_lost=224 audit_rate_limit=0 audit_backlog_limit=64 [ 1419.225966] audit: audit_backlog=65 > audit_backlog_limit=64 07:53:51 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x84) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8, 0x84001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x20002, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) listen(0xffffffffffffffff, 0x8000000000006) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x101400, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000240)={0xa, 0x2, 0x7, 0xcd8a}, 0xa) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000180)="157d348c39355ad077427742b08374b73cc66f536c0c6d2c0836a8da417636af5b74b1d1a0b34d70d8f81317d1ab04a62788e591cf2af603cd7c10e4ffe910d35b6e69bce0daceef4ce9733e78c12cbec1e6c3385166c6") sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) r4 = semget(0x0, 0x3, 0x10) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000540)=[0x1000, 0x3, 0xd2e3, 0xbc6, 0x8, 0xe04, 0x1201, 0x100000000, 0x3, 0x5]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000580)) listen(r3, 0x9) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xb4, r5, 0x328, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) 07:53:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="b13491cd806969ef69dc00d9c4a2d1920cec1402ab39fd5bf9e2f9b315c7e4c653fb0fc4014cb63a3af4a95ff9c44159da164f01ccc421fc51c1c461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18420ffb17dedfdf6736676666430fefb300000000c4428500dcf30f1a1254114d54111d00") syz_execute_func(&(0x7f0000000100)="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") 07:53:51 executing program 2: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="a9ee55e6efc355b5d84579e1e0581cc25f19e348ceb89b33bd33da13f96bbe0dcc630a821b80d3d0a483a8c5f29797398c28dbc85610dbb0af30258f767edff6d7b5a45e8ffa59734a1a82f440b46595ea85a27c19429df8ac14fd8c", 0x5c, 0xfffffffffffffff9) keyctl$update(0x2, r0, &(0x7f00000014c0)="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", 0xc4c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xffffffffffffff70) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r2 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r4 = dup(r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$input_event(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffb) 07:53:51 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x8, 0x84001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x20002, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) listen(0xffffffffffffffff, 0x8000000000006) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x101400, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000240)={0xa, 0x2, 0x7, 0xcd8a}, 0xa) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000180)="157d348c39355ad077427742b08374b73cc66f536c0c6d2c0836a8da417636af5b74b1d1a0b34d70d8f81317d1ab04a62788e591cf2af603cd7c10e4ffe910d35b6e69bce0daceef4ce9733e78c12cbec1e6c3385166c6") sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) r4 = semget(0x0, 0x3, 0x10) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000540)=[0x1000, 0x3, 0xd2e3, 0xbc6, 0x8, 0xe04, 0x1201, 0x100000000, 0x3, 0x5]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000580)) listen(r3, 0x9) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xb4, r5, 0x328, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) 07:53:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000001200)="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") 07:53:52 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000000)=@sco, 0xf, 0x0}, 0x0) 07:53:53 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x200003, 0x5}) 07:53:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) open(&(0x7f0000000100)='\x00', 0x200, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) [ 1422.177894] kauditd_printk_skb: 162 callbacks suppressed [ 1422.177902] audit: type=1400 audit(1557215633.763:9819): avc: denied { map } for pid=5366 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:54 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x800) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x400, 0x101140) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0xb4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x10000000000, &(0x7f0000000440), 0x4000000000000000, 0x0, [0x9c00]}}, 0xfef5) [ 1422.574689] audit: type=1400 audit(1557215633.813:9820): avc: denied { map } for pid=5364 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:54 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="16dc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="b13691cd80c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0f014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47edcfd7cfd7c652642d1fb26400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12f2400f125200111d54111d00") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) mknod(0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0xff8) [ 1422.896900] audit: type=1400 audit(1557215633.833:9821): avc: denied { map } for pid=5366 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:54 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) dup2(r1, r0) [ 1423.177049] audit: type=1400 audit(1557215633.833:9822): avc: denied { map } for pid=5366 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1423.483320] audit: type=1400 audit(1557215633.833:9823): avc: denied { map } for pid=5366 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1423.803042] audit: type=1400 audit(1557215633.883:9824): avc: denied { map } for pid=5364 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1424.177757] audit: type=1400 audit(1557215633.883:9825): avc: denied { map } for pid=5364 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000340)="b13491cd806969ef69dc00d9c4a2d1920cec1402ab39fd5bf9e2f9b315c7e4c653fb0fc4014cb63a3af4a95ff9c44159da164f01ccc421fc51c1c461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c5726400f0d18420ffb17dedfdf6736676666430fefb300000000c4428500dcf30f1a1254114d54111d00") syz_execute_func(&(0x7f0000000100)="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") 07:53:56 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) dup2(r1, r0) [ 1424.486024] audit: type=1400 audit(1557215633.963:9826): avc: denied { map } for pid=5364 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:56 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x800) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x400, 0x101140) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0xb4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x10000000000, &(0x7f0000000440), 0x4000000000000000, 0x0, [0x9c00]}}, 0xfef5) 07:53:56 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="16dc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="b13691cd80c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0f014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47edcfd7cfd7c652642d1fb26400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12f2400f125200111d54111d00") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) mknod(0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0xff8) [ 1424.830146] audit: type=1400 audit(1557215633.993:9827): avc: denied { map } for pid=5366 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1425.102707] audit: type=1400 audit(1557215634.003:9828): avc: denied { map } for pid=5364 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:56 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x800) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x400, 0x101140) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0xb4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x10000000000, &(0x7f0000000440), 0x4000000000000000, 0x0, [0x9c00]}}, 0xfef5) 07:53:57 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) dup2(r1, r0) 07:53:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) open(&(0x7f0000000100)='\x00', 0x200, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) 07:53:58 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x800) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x400, 0x101140) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0xb4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x10000000000, &(0x7f0000000440), 0x4000000000000000, 0x0, [0x9c00]}}, 0xfef5) 07:53:58 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x800) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x400, 0x101140) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0xb4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x10000000000, &(0x7f0000000440), 0x4000000000000000, 0x0, [0x9c00]}}, 0xfef5) 07:53:58 executing program 0: r0 = socket$inet_sctp(0x2, 0x1000000000001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000040)) [ 1427.196941] kauditd_printk_skb: 91 callbacks suppressed [ 1427.196950] audit: type=1400 audit(1557215638.783:9920): avc: denied { map } for pid=5414 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:58 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@routing, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) dup2(r1, r0) [ 1427.566826] audit: type=1400 audit(1557215638.793:9921): avc: denied { map } for pid=5418 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:53:59 executing program 0: r0 = socket$inet_sctp(0x2, 0x1000000000001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000040)) [ 1427.891355] audit: type=1400 audit(1557215638.793:9922): avc: denied { map } for pid=5418 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1428.178599] audit: type=1400 audit(1557215638.823:9923): avc: denied { map } for pid=5418 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:00 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="16dc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="b13691cd80c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0f014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47edcfd7cfd7c652642d1fb26400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12f2400f125200111d54111d00") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) mknod(0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0xff8) [ 1428.436639] audit: type=1400 audit(1557215638.863:9924): avc: denied { map } for pid=5414 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:00 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x800) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x400, 0x101140) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0xb4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x10000000000, &(0x7f0000000440), 0x4000000000000000, 0x0, [0x9c00]}}, 0xfef5) [ 1428.718935] audit: type=1400 audit(1557215638.903:9925): avc: denied { map } for pid=5414 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:00 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x800) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x400, 0x101140) syz_open_procfs(0x0, &(0x7f0000000080)='sessionid\x00') mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0xb4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x10000000000, &(0x7f0000000440), 0x4000000000000000, 0x0, [0x9c00]}}, 0xfef5) 07:54:00 executing program 1: syz_emit_ethernet(0x42, &(0x7f0000000000)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @remote}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 1429.020131] audit: type=1400 audit(1557215638.913:9926): avc: denied { map } for pid=5421 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x1000000000001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000040)) [ 1429.278831] audit: type=1400 audit(1557215638.913:9927): avc: denied { map } for pid=5418 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1429.463622] audit: type=1400 audit(1557215638.963:9928): avc: denied { map } for pid=5421 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1429.730128] audit: type=1400 audit(1557215638.983:9929): avc: denied { map } for pid=5418 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:01 executing program 1: syz_emit_ethernet(0x42, &(0x7f0000000000)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @remote}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 07:54:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) open(&(0x7f0000000100)='\x00', 0x200, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) 07:54:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x1000000000001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000040)) 07:54:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x8000330003f0) 07:54:02 executing program 1: syz_emit_ethernet(0x42, &(0x7f0000000000)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @remote}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 07:54:03 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) 07:54:03 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x101041, 0x0) r0 = getpid() syz_open_procfs(r0, 0x0) [ 1432.236951] kauditd_printk_skb: 87 callbacks suppressed [ 1432.236959] audit: type=1400 audit(1557215643.823:10017): avc: denied { map } for pid=5460 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:04 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="16dc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="b13691cd80c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0f014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47edcfd7cfd7c652642d1fb26400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a12f2400f125200111d54111d00") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) mknod(0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0xff8) 07:54:04 executing program 1: syz_emit_ethernet(0x42, &(0x7f0000000000)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @remote}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 07:54:04 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) [ 1432.512605] audit: type=1400 audit(1557215643.823:10018): avc: denied { map } for pid=5460 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:04 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, 0x0) 07:54:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x8000330003f0) [ 1432.841233] audit: type=1400 audit(1557215643.973:10019): avc: denied { map } for pid=5460 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1433.140331] audit: type=1400 audit(1557215644.013:10020): avc: denied { map } for pid=5460 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1433.440794] audit: type=1400 audit(1557215644.093:10021): avc: denied { map } for pid=5473 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1433.730116] audit: type=1400 audit(1557215644.153:10022): avc: denied { map } for pid=5473 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x8000330003f0) [ 1434.030331] audit: type=1400 audit(1557215644.163:10023): avc: denied { map } for pid=5460 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1434.310286] audit: type=1400 audit(1557215644.163:10024): avc: denied { map } for pid=5460 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1434.632855] audit: type=1400 audit(1557215644.193:10025): avc: denied { map } for pid=5473 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1434.929036] audit: type=1400 audit(1557215644.193:10026): avc: denied { map } for pid=5473 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r1 = socket$inet6(0xa, 0x2, 0x0) open(&(0x7f0000000100)='\x00', 0x200, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x75c, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) 07:54:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x8000330003f0) 07:54:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x8000330003f0) 07:54:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x6, 0x5a0f6613ec67e573) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000200)=0x401) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000040)={0x7, 0x0, 'client0\x00', 0x0, "4f30be8d74b51bba", "7f4e77bb2f1a711d686e1dcd50951f98f2474fff0f0c3738fcd3b5b20a76d385", 0x6a60, 0x1}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000100)='./file0\x00', r2, r3, 0x900) 07:54:07 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) 07:54:07 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) 07:54:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 07:54:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x8000330003f0) 07:54:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x84, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0x84}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:54:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x8000330003f0) [ 1437.318723] kauditd_printk_skb: 89 callbacks suppressed [ 1437.318741] audit: type=1400 audit(1557215648.903:10116): avc: denied { map } for pid=5516 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:09 executing program 4: r0 = syz_open_dev$usb(0x0, 0x6, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000000c0)={0x80000001, 0x8, 0x1}, 0x10) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000006c40)=ANY=[@ANYBLOB="ff0100000000da0b0040000000004ba329"], 0x11) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000240)='./file0\x00', 0x1) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f0000000180)=0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) [ 1437.678351] audit: type=1400 audit(1557215648.903:10117): avc: denied { map } for pid=5516 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1437.973041] audit: type=1400 audit(1557215649.033:10118): avc: denied { map } for pid=5516 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:09 executing program 3: openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) accept$ax25(r0, &(0x7f0000000140)={{0x3, @rose}, [@null, @netrom, @rose, @bcast, @remote, @null, @netrom, @bcast]}, &(0x7f00000001c0)=0x48) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x0, 0x0) ioctl(r1, 0x5, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r2, &(0x7f0000003a00), 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000003c40)='/dev/loop#\x00', 0x200, 0x105000) memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000380)={0x1, "086299a8c9dc53b00a5ab6650688048ad14761729b4be067b631b1244787bbf5", 0x1, 0x0, 0x3, 0x1, 0x4}) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, 0xffffffffffffffff) r5 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x3) write$binfmt_script(r6, &(0x7f00000002c0)=ANY=[], 0x0) read$FUSE(r5, &(0x7f0000000600), 0x1000) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x4000, 0x0) close(r6) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008913, &(0x7f0000000200)="0adc1f123c123f319bd070") fstat(0xffffffffffffffff, 0x0) [ 1438.341162] audit: type=1400 audit(1557215649.033:10119): avc: denied { map } for pid=5516 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1438.646590] audit: type=1400 audit(1557215649.123:10120): avc: denied { map } for pid=5524 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1438.990260] audit: type=1400 audit(1557215649.133:10121): avc: denied { map } for pid=5516 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1439.340121] audit: type=1400 audit(1557215649.153:10122): avc: denied { map } for pid=5524 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1439.584959] audit: type=1400 audit(1557215649.163:10123): avc: denied { map } for pid=5516 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x4c}]}, &(0x7f0000007dc0)='GPL\x00'}, 0x48) 07:54:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x84, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0x84}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") 07:54:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="b13691cd806969ef69dc00d9c4a2d1920cec38c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95ff9c44149f2168f4808eebce00000802000c421fc51c12aeac461a1f8a100000021c4e189d8a42973858e2c0f186746f3400faee47e7c730f5726400f0d18c401fe5ff6e7df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400), 0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000000)=""/3) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f00000003c0), 0x4) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r1, r1, 0x0, 0x8000fffffffb) 07:54:11 executing program 4: r0 = syz_open_dev$usb(0x0, 0x6, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000000c0)={0x80000001, 0x8, 0x1}, 0x10) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000006c40)=ANY=[@ANYBLOB="ff0100000000da0b0040000000004ba329"], 0x11) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000240)='./file0\x00', 0x1) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f0000000180)=0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 07:54:11 executing program 3: openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) accept$ax25(r0, &(0x7f0000000140)={{0x3, @rose}, [@null, @netrom, @rose, @bcast, @remote, @null, @netrom, @bcast]}, &(0x7f00000001c0)=0x48) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x0, 0x0) ioctl(r1, 0x5, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r2, &(0x7f0000003a00), 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000003c40)='/dev/loop#\x00', 0x200, 0x105000) memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000380)={0x1, "086299a8c9dc53b00a5ab6650688048ad14761729b4be067b631b1244787bbf5", 0x1, 0x0, 0x3, 0x1, 0x4}) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, 0xffffffffffffffff) r5 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x3) write$binfmt_script(r6, &(0x7f00000002c0)=ANY=[], 0x0) read$FUSE(r5, &(0x7f0000000600), 0x1000) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x4000, 0x0) close(r6) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008913, &(0x7f0000000200)="0adc1f123c123f319bd070") fstat(0xffffffffffffffff, 0x0) [ 1439.916400] audit: type=1400 audit(1557215649.203:10124): avc: denied { map } for pid=5524 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 07:54:11 executing program 2: openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) accept$ax25(r0, &(0x7f0000000140)={{0x3, @rose}, [@null, @netrom, @rose, @bcast, @remote, @null, @netrom, @bcast]}, &(0x7f00000001c0)=0x48) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x0, 0x0) ioctl(r1, 0x5, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r2, &(0x7f0000003a00), 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000003c40)='/dev/loop#\x00', 0x200, 0x105000) memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000380)={0x1, "086299a8c9dc53b00a5ab6650688048ad14761729b4be067b631b1244787bbf5", 0x1, 0x0, 0x3, 0x1, 0x4}) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, 0xffffffffffffffff) r5 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x3) write$binfmt_script(r6, &(0x7f00000002c0)=ANY=[], 0x0) read$FUSE(r5, &(0x7f0000000600), 0x1000) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x4000, 0x0) close(r6) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008913, &(0x7f0000000200)="0adc1f123c123f319bd070") fstat(0xffffffffffffffff, 0x0) [ 1440.248316] audit: type=1400 audit(1557215649.203:10125): avc: denied { map } for pid=5524 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1440.282561] ------------[ cut here ]------------ [ 1440.287688] WARNING: CPU: 0 PID: 30746 at kernel/bpf/core.c:537 bpf_jit_free+0x23a/0x310 [ 1440.295926] Kernel panic - not syncing: panic_on_warn set ... [ 1440.295926] [ 1440.303289] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1440.310040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1440.319406] Workqueue: events bpf_prog_free_deferred [ 1440.324511] Call Trace: [ 1440.327102] dump_stack+0x138/0x19c [ 1440.330746] panic+0x1f2/0x438 [ 1440.333941] ? add_taint.cold+0x16/0x16 [ 1440.337923] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1440.345027] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1440.349945] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1440.356798] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1440.361288] Modules linked in: [ 1440.364489] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1440.371230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1440.380589] Workqueue: events bpf_prog_free_deferred [ 1440.385688] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1440.391749] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1440.397191] RSP: 0018:ffff88809f497810 EFLAGS: 00010806 [ 1440.402552] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1440.409814] RDX: 0000000000000000 RSI: ffffffff869bf4c0 RDI: ffffc900018e1002 [ 1440.417077] RBP: ffff88809f497850 R08: 0000000000000000 R09: ffff888054d32e70 [ 1440.424343] R10: ffff888054d32e50 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1440.431612] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1440.438875] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1440.447094] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1440.452973] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1440.460238] Call Trace: [ 1440.462831] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1440.469942] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1440.474859] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1440.481805] Oops: 0000 [#2] PREEMPT SMP KASAN [ 1440.486383] Modules linked in: [ 1440.489583] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1440.496357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1440.505718] Workqueue: events bpf_prog_free_deferred [ 1440.510825] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1440.516881] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1440.522321] RSP: 0018:ffff88809f497368 EFLAGS: 00010806 [ 1440.527682] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1440.534953] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1440.542233] RBP: ffff88809f4973a8 R08: 0000000000000000 R09: 0000000000000001 [ 1440.549503] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1440.556769] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1440.564035] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1440.572257] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1440.578137] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1440.585402] Call Trace: [ 1440.587995] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1440.595102] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1440.600027] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1440.606882] Oops: 0000 [#3] PREEMPT SMP KASAN [ 1440.611369] Modules linked in: [ 1440.614559] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1440.621303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1440.630661] Workqueue: events bpf_prog_free_deferred [ 1440.635760] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1440.641819] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1440.647261] RSP: 0018:ffff88809f496eb8 EFLAGS: 00010806 [ 1440.652624] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1440.659890] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1440.667154] RBP: ffff88809f496ef8 R08: 0000000000000000 R09: 0000000000000001 [ 1440.674419] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1440.681697] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1440.688975] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1440.697196] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1440.703072] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1440.710341] Call Trace: [ 1440.712939] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1440.720049] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1440.724976] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1440.731828] Oops: 0000 [#4] PREEMPT SMP KASAN [ 1440.736314] Modules linked in: [ 1440.739506] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1440.746247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1440.755605] Workqueue: events bpf_prog_free_deferred [ 1440.760704] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1440.766766] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1440.772210] RSP: 0018:ffff88809f496a08 EFLAGS: 00010806 [ 1440.777570] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1440.784833] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1440.792100] RBP: ffff88809f496a48 R08: 0000000000000000 R09: 0000000000000001 [ 1440.799369] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1440.806635] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1440.813903] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1440.822220] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1440.828096] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1440.835389] Call Trace: [ 1440.837985] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1440.845098] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1440.850020] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1440.856871] Oops: 0000 [#5] PREEMPT SMP KASAN [ 1440.861361] Modules linked in: [ 1440.864554] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1440.871306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1440.880668] Workqueue: events bpf_prog_free_deferred [ 1440.885768] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1440.891825] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1440.897265] RSP: 0018:ffff88809f496558 EFLAGS: 00010806 [ 1440.902628] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1440.909896] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1440.917160] RBP: ffff88809f496598 R08: 0000000000000000 R09: 0000000000000001 [ 1440.924423] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1440.931699] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1440.938974] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1440.947371] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1440.953248] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1440.960519] Call Trace: [ 1440.963112] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1440.970223] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1440.975146] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1440.982093] Oops: 0000 [#6] PREEMPT SMP KASAN [ 1440.986585] Modules linked in: [ 1440.989778] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1440.996527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.005894] Workqueue: events bpf_prog_free_deferred [ 1441.011004] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1441.017064] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1441.022510] RSP: 0018:ffff88809f4960a8 EFLAGS: 00010806 [ 1441.027871] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1441.035138] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1441.042403] RBP: ffff88809f4960e8 R08: 0000000000000000 R09: 0000000000000001 [ 1441.049667] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1441.057031] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1441.064329] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1441.072551] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1441.078426] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1441.085710] Call Trace: [ 1441.088313] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1441.095424] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1441.100353] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1441.108701] Oops: 0000 [#7] PREEMPT SMP KASAN [ 1441.113196] Modules linked in: [ 1441.116388] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1441.123132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.132496] Workqueue: events bpf_prog_free_deferred [ 1441.137600] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1441.143660] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1441.149126] RSP: 0018:ffff88809f495bf8 EFLAGS: 00010806 [ 1441.154489] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1441.161754] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1441.169019] RBP: ffff88809f495c38 R08: 0000000000000000 R09: 0000000000000001 [ 1441.176386] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1441.183654] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1441.190928] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1441.199240] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1441.205152] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1441.213563] Call Trace: [ 1441.216155] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1441.223267] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1441.228192] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1441.235043] Oops: 0000 [#8] PREEMPT SMP KASAN [ 1441.239533] Modules linked in: [ 1441.242732] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1441.249484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.258848] Workqueue: events bpf_prog_free_deferred [ 1441.263951] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1441.270009] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1441.275464] RSP: 0018:ffff88809f495748 EFLAGS: 00010806 [ 1441.280824] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1441.288090] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1441.295357] RBP: ffff88809f495788 R08: 0000000000000000 R09: 0000000000000001 [ 1441.302625] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1441.309892] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1441.317159] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1441.325380] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1441.331257] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1441.338528] Call Trace: [ 1441.341124] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1441.348237] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1441.353162] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1441.360017] Oops: 0000 [#9] PREEMPT SMP KASAN [ 1441.364503] Modules linked in: [ 1441.367700] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1441.374538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.383894] Workqueue: events bpf_prog_free_deferred [ 1441.388996] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1441.395055] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1441.400504] RSP: 0018:ffff88809f495298 EFLAGS: 00010806 [ 1441.405871] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1441.413137] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1441.420409] RBP: ffff88809f4952d8 R08: 0000000000000000 R09: 0000000000000001 [ 1441.427676] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1441.434945] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1441.442210] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1441.450427] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1441.456322] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1441.463586] Call Trace: [ 1441.466178] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1441.473287] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1441.478209] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1441.485057] Oops: 0000 [#10] PREEMPT SMP KASAN [ 1441.489629] Modules linked in: [ 1441.492824] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1441.499566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.508924] Workqueue: events bpf_prog_free_deferred [ 1441.514026] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1441.520082] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1441.525526] RSP: 0018:ffff88809f494de8 EFLAGS: 00010806 [ 1441.530893] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1441.538159] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1441.545428] RBP: ffff88809f494e28 R08: 0000000000000000 R09: 0000000000000001 [ 1441.552708] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1441.559980] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1441.567249] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1441.575482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1441.581360] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1441.588624] Call Trace: [ 1441.591213] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1441.598325] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1441.603246] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1441.610108] Oops: 0000 [#11] PREEMPT SMP KASAN [ 1441.614690] Modules linked in: [ 1441.617888] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1441.624629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.634057] Workqueue: events bpf_prog_free_deferred [ 1441.639246] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1441.645304] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1441.650751] RSP: 0018:ffff88809f494938 EFLAGS: 00010806 [ 1441.656112] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1441.663376] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1441.670642] RBP: ffff88809f494978 R08: 0000000000000000 R09: 0000000000000001 [ 1441.677904] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1441.685183] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1441.692463] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1441.700689] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1441.706566] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1441.713832] Call Trace: [ 1441.716422] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1441.723542] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1441.728483] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1441.735333] Oops: 0000 [#12] PREEMPT SMP KASAN [ 1441.739903] Modules linked in: [ 1441.743095] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1441.749836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.759195] Workqueue: events bpf_prog_free_deferred [ 1441.764293] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1441.770348] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1441.775792] RSP: 0018:ffff88809f494488 EFLAGS: 00010806 [ 1441.781151] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1441.788417] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1441.795799] RBP: ffff88809f4944c8 R08: 0000000000000000 R09: 0000000000000001 [ 1441.803062] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1441.810334] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1441.817601] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1441.825824] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1441.831701] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1441.838977] Call Trace: [ 1441.841572] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1441.848683] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1441.853606] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1441.860467] Oops: 0000 [#13] PREEMPT SMP KASAN [ 1441.865044] Modules linked in: [ 1441.868236] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1441.874983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.884345] Workqueue: events bpf_prog_free_deferred [ 1441.889446] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1441.895516] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1441.900955] RSP: 0018:ffff88809f493fd8 EFLAGS: 00010806 [ 1441.906401] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1441.913680] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1441.920946] RBP: ffff88809f494018 R08: 0000000000000000 R09: 0000000000000001 [ 1441.928209] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1441.935484] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1441.942758] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1441.950988] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1441.956866] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1441.964143] Call Trace: [ 1441.966744] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1441.973852] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1441.978777] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1441.985623] Oops: 0000 [#14] PREEMPT SMP KASAN [ 1441.990197] Modules linked in: [ 1441.993390] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1442.000133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.009500] Workqueue: events bpf_prog_free_deferred [ 1442.014599] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1442.020657] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1442.026099] RSP: 0018:ffff88809f493b28 EFLAGS: 00010806 [ 1442.031464] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1442.038738] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1442.046007] RBP: ffff88809f493b68 R08: 0000000000000000 R09: 0000000000000001 [ 1442.053274] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1442.060540] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1442.067896] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1442.076120] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1442.081997] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1442.089261] Call Trace: [ 1442.091854] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1442.098959] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1442.104119] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1442.110970] Oops: 0000 [#15] PREEMPT SMP KASAN [ 1442.115543] Modules linked in: [ 1442.118745] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1442.125493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.134854] Workqueue: events bpf_prog_free_deferred [ 1442.139958] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1442.146045] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1442.151490] RSP: 0018:ffff88809f493678 EFLAGS: 00010806 [ 1442.156852] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1442.164115] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1442.171378] RBP: ffff88809f4936b8 R08: 0000000000000000 R09: 0000000000000001 [ 1442.178646] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1442.185914] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1442.193207] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1442.201429] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1442.207321] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1442.214593] Call Trace: [ 1442.217193] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1442.224317] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1442.229236] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1442.236086] Oops: 0000 [#16] PREEMPT SMP KASAN [ 1442.240664] Modules linked in: [ 1442.243860] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1442.250602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.259973] Workqueue: events bpf_prog_free_deferred [ 1442.265073] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1442.271136] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1442.276579] RSP: 0018:ffff88809f4931c8 EFLAGS: 00010806 [ 1442.281946] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1442.289208] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1442.296479] RBP: ffff88809f493208 R08: 0000000000000000 R09: 0000000000000001 [ 1442.303751] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1442.311020] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1442.318287] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1442.326525] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1442.332401] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1442.339665] Call Trace: [ 1442.342257] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1442.349369] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1442.354289] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1442.361139] Oops: 0000 [#17] PREEMPT SMP KASAN [ 1442.365714] Modules linked in: [ 1442.368918] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1442.375669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.385028] Workqueue: events bpf_prog_free_deferred [ 1442.390131] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1442.396186] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1442.401631] RSP: 0018:ffff88809f492d18 EFLAGS: 00010806 [ 1442.406992] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1442.414257] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1442.421528] RBP: ffff88809f492d58 R08: 0000000000000000 R09: 0000000000000001 [ 1442.428802] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1442.436069] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1442.443336] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1442.451555] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1442.457436] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1442.464716] Call Trace: [ 1442.467317] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1442.474427] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1442.479362] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1442.486212] Oops: 0000 [#18] PREEMPT SMP KASAN [ 1442.490791] Modules linked in: [ 1442.493989] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1442.500737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.510183] Workqueue: events bpf_prog_free_deferred [ 1442.515284] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1442.521342] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1442.526796] RSP: 0018:ffff88809f492868 EFLAGS: 00010806 [ 1442.532214] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1442.539483] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1442.546755] RBP: ffff88809f4928a8 R08: 0000000000000000 R09: 0000000000000001 [ 1442.554025] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1442.561294] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1442.568561] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1442.576780] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1442.582659] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1442.589925] Call Trace: [ 1442.592520] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1442.599630] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1442.604546] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1442.611393] Oops: 0000 [#19] PREEMPT SMP KASAN [ 1442.615966] Modules linked in: [ 1442.619158] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1442.625899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.635259] Workqueue: events bpf_prog_free_deferred [ 1442.640359] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1442.646766] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1442.652210] RSP: 0018:ffff88809f4923b8 EFLAGS: 00010806 [ 1442.657568] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1442.664834] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1442.672096] RBP: ffff88809f4923f8 R08: 0000000000000000 R09: 0000000000000001 [ 1442.679363] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1442.686631] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1442.693898] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1442.702119] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1442.707997] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1442.715267] Call Trace: [ 1442.717859] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1442.724966] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1442.729887] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1442.736740] Oops: 0000 [#20] PREEMPT SMP KASAN [ 1442.741316] Modules linked in: [ 1442.744512] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1442.751254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.760608] Workqueue: events bpf_prog_free_deferred [ 1442.765706] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1442.771769] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1442.777211] RSP: 0018:ffff88809f491f08 EFLAGS: 00010806 [ 1442.782569] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1442.789831] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1442.797096] RBP: ffff88809f491f48 R08: 0000000000000000 R09: 0000000000000001 [ 1442.804359] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1442.811622] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1442.818893] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1442.827113] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1442.832989] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1442.840285] Call Trace: [ 1442.842878] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1442.849989] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1442.854906] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1442.861755] Oops: 0000 [#21] PREEMPT SMP KASAN [ 1442.866330] Modules linked in: [ 1442.869523] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1442.876271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.885629] Workqueue: events bpf_prog_free_deferred [ 1442.890735] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1442.896794] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1442.902237] RSP: 0018:ffff88809f491a58 EFLAGS: 00010806 [ 1442.907597] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1442.914866] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1442.922133] RBP: ffff88809f491a98 R08: 0000000000000000 R09: 0000000000000001 [ 1442.929400] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1442.936668] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1442.943939] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1442.952161] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1442.958039] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1442.965305] Call Trace: [ 1442.967907] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1442.975025] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1442.979945] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1442.986801] Oops: 0000 [#22] PREEMPT SMP KASAN [ 1442.991376] Modules linked in: [ 1442.994568] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1443.001311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.010673] Workqueue: events bpf_prog_free_deferred [ 1443.015773] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1443.021830] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1443.027272] RSP: 0018:ffff88809f4915a8 EFLAGS: 00010806 [ 1443.032646] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1443.039912] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1443.047176] RBP: ffff88809f4915e8 R08: 0000000000000000 R09: 0000000000000001 [ 1443.054445] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1443.061734] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1443.069006] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1443.077349] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1443.083227] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1443.090493] Call Trace: [ 1443.093086] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1443.100195] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1443.106620] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1443.113484] Oops: 0000 [#23] PREEMPT SMP KASAN [ 1443.118059] Modules linked in: [ 1443.121248] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1443.127992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.137349] Workqueue: events bpf_prog_free_deferred [ 1443.142457] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1443.148514] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1443.153954] RSP: 0018:ffff88809f4910f8 EFLAGS: 00010806 [ 1443.159311] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1443.166579] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1443.173849] RBP: ffff88809f491138 R08: 0000000000000000 R09: 0000000000000001 [ 1443.181112] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1443.188378] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1443.195647] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1443.203870] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1443.210569] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1443.217834] Call Trace: [ 1443.220424] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1443.227555] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1443.232479] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1443.239332] Oops: 0000 [#24] PREEMPT SMP KASAN [ 1443.243901] Modules linked in: [ 1443.247090] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1443.253833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.263186] Workqueue: events bpf_prog_free_deferred [ 1443.268441] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1443.274505] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1443.279945] RSP: 0018:ffff88809f490c48 EFLAGS: 00010806 [ 1443.285308] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1443.292608] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1443.299871] RBP: ffff88809f490c88 R08: 0000000000000000 R09: 0000000000000001 07:54:12 executing program 2: openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) accept$ax25(r0, &(0x7f0000000140)={{0x3, @rose}, [@null, @netrom, @rose, @bcast, @remote, @null, @netrom, @bcast]}, &(0x7f00000001c0)=0x48) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x0, 0x0) ioctl(r1, 0x5, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r2, &(0x7f0000003a00), 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000003c40)='/dev/loop#\x00', 0x200, 0x105000) memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000380)={0x1, "086299a8c9dc53b00a5ab6650688048ad14761729b4be067b631b1244787bbf5", 0x1, 0x0, 0x3, 0x1, 0x4}) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, 0xffffffffffffffff) r5 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x3) write$binfmt_script(r6, &(0x7f00000002c0)=ANY=[], 0x0) read$FUSE(r5, &(0x7f0000000600), 0x1000) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x4000, 0x0) close(r6) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008913, &(0x7f0000000200)="0adc1f123c123f319bd070") fstat(0xffffffffffffffff, 0x0) 07:54:13 executing program 3: openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) accept$ax25(r0, &(0x7f0000000140)={{0x3, @rose}, [@null, @netrom, @rose, @bcast, @remote, @null, @netrom, @bcast]}, &(0x7f00000001c0)=0x48) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x0, 0x0) ioctl(r1, 0x5, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r2, &(0x7f0000003a00), 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000003c40)='/dev/loop#\x00', 0x200, 0x105000) memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000380)={0x1, "086299a8c9dc53b00a5ab6650688048ad14761729b4be067b631b1244787bbf5", 0x1, 0x0, 0x3, 0x1, 0x4}) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, 0xffffffffffffffff) r5 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x3) write$binfmt_script(r6, &(0x7f00000002c0)=ANY=[], 0x0) read$FUSE(r5, &(0x7f0000000600), 0x1000) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x4000, 0x0) close(r6) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008913, &(0x7f0000000200)="0adc1f123c123f319bd070") fstat(0xffffffffffffffff, 0x0) 07:54:13 executing program 2: openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) accept$ax25(r0, &(0x7f0000000140)={{0x3, @rose}, [@null, @netrom, @rose, @bcast, @remote, @null, @netrom, @bcast]}, &(0x7f00000001c0)=0x48) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x0, 0x0) ioctl(r1, 0x5, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r2, &(0x7f0000003a00), 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000003c40)='/dev/loop#\x00', 0x200, 0x105000) memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000380)={0x1, "086299a8c9dc53b00a5ab6650688048ad14761729b4be067b631b1244787bbf5", 0x1, 0x0, 0x3, 0x1, 0x4}) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, 0xffffffffffffffff) r5 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x3) write$binfmt_script(r6, &(0x7f00000002c0)=ANY=[], 0x0) read$FUSE(r5, &(0x7f0000000600), 0x1000) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x4000, 0x0) close(r6) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008913, &(0x7f0000000200)="0adc1f123c123f319bd070") fstat(0xffffffffffffffff, 0x0) 07:54:14 executing program 3: openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) accept$ax25(r0, &(0x7f0000000140)={{0x3, @rose}, [@null, @netrom, @rose, @bcast, @remote, @null, @netrom, @bcast]}, &(0x7f00000001c0)=0x48) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x0, 0x0) ioctl(r1, 0x5, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r2, &(0x7f0000003a00), 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000003c40)='/dev/loop#\x00', 0x200, 0x105000) memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000380)={0x1, "086299a8c9dc53b00a5ab6650688048ad14761729b4be067b631b1244787bbf5", 0x1, 0x0, 0x3, 0x1, 0x4}) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, 0xffffffffffffffff) r5 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x3) write$binfmt_script(r6, &(0x7f00000002c0)=ANY=[], 0x0) read$FUSE(r5, &(0x7f0000000600), 0x1000) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x4000, 0x0) close(r6) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008913, &(0x7f0000000200)="0adc1f123c123f319bd070") fstat(0xffffffffffffffff, 0x0) 07:54:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x84, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0x84}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1443.307135] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1443.314401] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1443.321672] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1443.329893] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1443.335771] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1443.343035] Call Trace: [ 1443.345626] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1443.352739] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1443.357662] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1443.364505] Thread overran stack, or stack corrupted [ 1443.369602] Oops: 0000 [#25] PREEMPT SMP KASAN [ 1443.374173] Modules linked in: [ 1443.377363] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1443.384103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.393473] Workqueue: events bpf_prog_free_deferred [ 1443.398579] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1443.404641] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1443.410090] RSP: 0018:ffff88809f490798 EFLAGS: 00010806 [ 1443.415457] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1443.422735] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1443.430005] RBP: ffff88809f4907d8 R08: 0000000000000000 R09: 0000000000000001 [ 1443.437276] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1443.444541] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1443.451806] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1443.460027] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1443.465926] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1443.473197] Call Trace: [ 1443.475796] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1443.482911] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1443.487834] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1443.494679] Thread overran stack, or stack corrupted [ 1443.499773] Oops: 0000 [#26] PREEMPT SMP KASAN [ 1443.504348] Modules linked in: [ 1443.507550] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1443.514307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.523664] Workqueue: events bpf_prog_free_deferred [ 1443.528762] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1443.534815] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1443.540261] RSP: 0018:ffff88809f4902e8 EFLAGS: 00010806 [ 1443.545616] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1443.552879] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1443.560144] RBP: ffff88809f490328 R08: 0000000000000000 R09: 0000000000000001 [ 1443.567409] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1443.574760] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1443.582112] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1443.590339] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1443.596214] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1443.603484] Call Trace: [ 1443.606074] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1443.613183] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1443.618106] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1443.624950] Thread overran stack, or stack corrupted [ 1443.630047] Oops: 0000 [#27] PREEMPT SMP KASAN [ 1443.634622] Modules linked in: [ 1443.637818] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1443.644562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.653917] Workqueue: events bpf_prog_free_deferred [ 1443.659015] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1443.665072] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1443.670513] RSP: 0018:ffff88809f48fe38 EFLAGS: 00010806 [ 1443.675874] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1443.683136] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1443.690403] RBP: ffff88809f48fe78 R08: 0000000000000000 R09: 0000000000000001 [ 1443.697666] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1443.704930] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1443.712206] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1443.720425] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1443.726311] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1443.733575] Call Trace: [ 1443.736167] ? no_context+0x2ef/0x790 [ 1443.739965] ? pgtable_bad+0x120/0x120 [ 1443.743849] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1443.748952] ? serial8250_console_write+0x6a5/0x950 [ 1443.754005] ? __bad_area_nosemaphore+0x1f9/0x2a0 [ 1443.758845] ? bad_area_nosemaphore+0x34/0x40 [ 1443.763341] ? __do_page_fault+0x196/0xb80 [ 1443.767570] ? irq_work_queue+0x7f/0x1f0 [ 1443.771631] ? wake_up_klogd+0x90/0xc0 [ 1443.775521] ? vmalloc_fault+0xe60/0xe60 [ 1443.779581] ? do_page_fault+0x71/0x515 [ 1443.783557] ? page_fault+0x25/0x50 [ 1443.787197] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1443.794311] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1443.799231] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1443.806072] Thread overran stack, or stack corrupted 07:54:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x84, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0x84}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91cd800f0124eda133fa20430fbafce842f66188d0d038c4ab39fd5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f4808eebce00000802000c863fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833fe8f0f14e7e701fe5ff6e7df660fe7af5cc34a510804f4c441a5609c8ba80000005499") [ 1443.811170] Oops: 0000 [#28] PREEMPT SMP KASAN [ 1443.815746] Modules linked in: [ 1443.818942] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1443.825682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.835038] Workqueue: events bpf_prog_free_deferred [ 1443.840134] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1443.846190] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1443.851628] RSP: 0018:ffff88809f48f988 EFLAGS: 00010806 [ 1443.856984] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1443.864247] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1443.871576] RBP: ffff88809f48f9c8 R08: 0000000000000000 R09: 0000000000000001 [ 1443.878842] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1443.886103] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1443.893374] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1443.901595] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1443.907479] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1443.914753] Call Trace: [ 1443.917344] ? no_context+0x2ef/0x790 [ 1443.921155] ? pgtable_bad+0x120/0x120 [ 1443.925043] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1443.930147] ? serial8250_console_write+0x6a5/0x950 [ 1443.935251] ? __bad_area_nosemaphore+0x1f9/0x2a0 [ 1443.940094] ? bad_area_nosemaphore+0x34/0x40 [ 1443.944588] ? __do_page_fault+0x196/0xb80 [ 1443.948821] ? irq_work_queue+0x7f/0x1f0 [ 1443.952881] ? wake_up_klogd+0x90/0xc0 [ 1443.956770] ? vmalloc_fault+0xe60/0xe60 [ 1443.960834] ? do_page_fault+0x71/0x515 [ 1443.964807] ? page_fault+0x25/0x50 [ 1443.968481] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1443.975590] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1443.980513] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1443.987364] Thread overran stack, or stack corrupted [ 1443.992467] Oops: 0000 [#29] PREEMPT SMP KASAN [ 1443.997041] Modules linked in: [ 1444.000232] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1444.006974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1444.016336] Workqueue: events bpf_prog_free_deferred [ 1444.021438] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1444.027496] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1444.032946] RSP: 0018:ffff88809f48f4d8 EFLAGS: 00010806 [ 1444.038304] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1444.045569] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1444.052832] RBP: ffff88809f48f518 R08: 0000000000000000 R09: 0000000000000001 [ 1444.060096] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1444.067368] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1444.074633] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1444.082855] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1444.088735] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1444.096057] Call Trace: [ 1444.098644] ? no_context+0x2ef/0x790 [ 1444.102636] ? pgtable_bad+0x120/0x120 [ 1444.106520] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1444.111622] ? serial8250_console_write+0x6a5/0x950 [ 1444.118996] ? __bad_area_nosemaphore+0x1f9/0x2a0 [ 1444.127675] ? bad_area_nosemaphore+0x34/0x40 [ 1444.132170] ? __do_page_fault+0x196/0xb80 [ 1444.136401] ? irq_work_queue+0x7f/0x1f0 [ 1444.140473] ? wake_up_klogd+0x90/0xc0 [ 1444.144371] ? vmalloc_fault+0xe60/0xe60 [ 1444.148431] ? do_page_fault+0x71/0x515 [ 1444.152414] ? page_fault+0x25/0x50 [ 1444.156056] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1444.163157] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1444.168075] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1444.174921] Thread overran stack, or stack corrupted [ 1444.180017] Oops: 0000 [#30] PREEMPT SMP KASAN [ 1444.184590] Modules linked in: [ 1444.187784] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1444.194528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1444.203916] Workqueue: events bpf_prog_free_deferred [ 1444.209026] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1444.215091] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1444.220535] RSP: 0018:ffff88809f48f028 EFLAGS: 00010806 [ 1444.225892] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1444.233161] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1444.240432] RBP: ffff88809f48f068 R08: 0000000000000000 R09: 0000000000000001 [ 1444.247705] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1444.255006] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1444.262276] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1444.270496] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1444.276371] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1444.283634] Call Trace: [ 1444.286221] ? no_context+0x2ef/0x790 [ 1444.290022] ? pgtable_bad+0x120/0x120 [ 1444.293909] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1444.299013] ? serial8250_console_write+0x6a5/0x950 [ 1444.304032] ? __bad_area_nosemaphore+0x1f9/0x2a0 [ 1444.308883] ? bad_area_nosemaphore+0x34/0x40 [ 1444.313380] ? __do_page_fault+0x196/0xb80 [ 1444.317612] ? irq_work_queue+0x7f/0x1f0 [ 1444.321674] ? wake_up_klogd+0x90/0xc0 [ 1444.325559] ? vmalloc_fault+0xe60/0xe60 [ 1444.329617] ? do_page_fault+0x71/0x515 [ 1444.333592] ? page_fault+0x25/0x50 [ 1444.337226] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 1444.344331] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 1444.349254] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD a07f2067 PTE 0 [ 1444.356107] Thread overran stack, or stack corrupted [ 1444.361200] Oops: 0000 [#31] PREEMPT SMP KASAN [ 1444.365772] Modules linked in: [ 1444.368967] CPU: 0 PID: 30746 Comm: kworker/0:6 Not tainted 4.14.116 #6 [ 1444.369760] kobject: 'loop4' (ffff8880a4a28660): kobject_uevent_env [ 1444.375707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1444.375721] Workqueue: events bpf_prog_free_deferred [ 1444.375737] task: ffff888054d32580 task.stack: ffff88809f490000 [ 1444.400108] kobject: 'loop4' (ffff8880a4a28660): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1444.402628] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 1444.417495] RSP: 0018:ffff88809f48eb78 EFLAGS: 00010806 [ 1444.422859] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 1444.430120] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e1002 [ 1444.432296] kobject: 'loop3' (ffff8880a4a01720): kobject_uevent_env [ 1444.437386] RBP: ffff88809f48ebb8 R08: 0000000000000000 R09: 0000000000000001 [ 1444.451044] R10: 0000000000000000 R11: ffff888054d32580 R12: ffff8880a0921918 [ 1444.455370] kobject: 'loop3' (ffff8880a4a01720): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1444.458309] R13: dffffc0000000000 R14: ffff8880a0921918 R15: ffffffffffffffff [ 1444.458316] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1444.458324] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1444.489199] CR2: fffffbfff4002000 CR3: 0000000095768000 CR4: 00000000001426f0 [ 1444.496487] Call Trace: [ 1444.499066] Code: f0 00 00 00 f6 40 02 01 75 07 e8 67 1e f7 ff 0f 0b e8 60 1e f7 ff 49 39 df 0f 82 ac 00 00 00 e8 52 1e f7 ff 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e e6 00 00 00 8b 03 48 c1 [ 1444.518251] RIP: bpf_prog_kallsyms_find+0x155/0x280 RSP: ffff88809f48eb78 [ 1444.519737] kobject: 'loop2' (ffff8880a4946e20): kobject_uevent_env [ 1444.525166] CR2: fffffbfff4002000 [ 1444.525174] ---[ end trace e5b3b5a76b0683e9 ]--- [ 1444.525179] Kernel panic - not syncing: Fatal exception [ 1444.526253] Kernel Offset: disabled [ 1444.549737] Rebooting in 86400 seconds..