0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x24, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x80008f44, 0x2}, 0x40, 0xffffffffffffffff, 0x0, 0x0, 0x7fffffff, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, r3, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msgget$private(0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(r4, 0x5501) syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) r5 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) memfd_create(&(0x7f0000000280)='^\x00', 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) preadv(r5, &(0x7f0000000140), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r6 = inotify_init() dup2(r6, r4) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 04:22:35 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 04:22:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000002d00)=[{{0x0, 0x0, 0x0}, 0x3}], 0x1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x200000000, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001ec0)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[]], 0x8) 04:22:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x0, 0x400000b8) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 04:22:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, 0x0) [ 2831.954495][T21362] input: syz1 as /devices/virtual/input/input26 04:22:36 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key(0x0, 0x0, 0x0, 0x0, r0) 04:22:36 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) [ 2833.087225][ T27] kauditd_printk_skb: 172 callbacks suppressed [ 2833.087238][ T27] audit: type=1400 audit(1576383757.201:79792): avc: denied { map } for pid=21424 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) [ 2833.390365][ T27] audit: type=1400 audit(1576383757.221:79793): avc: denied { map } for pid=21449 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2833.614434][ T27] audit: type=1400 audit(1576383757.221:79794): avc: denied { map } for pid=21449 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:38 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) [ 2833.820022][ T27] audit: type=1400 audit(1576383757.280:79795): avc: denied { map } for pid=21431 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:38 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, 0x0) 04:22:38 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 2834.067186][ T27] audit: type=1400 audit(1576383757.280:79796): avc: denied { map } for pid=21431 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2834.295728][ T27] audit: type=1400 audit(1576383757.290:79797): avc: denied { map } for pid=21441 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2834.472958][ T27] audit: type=1400 audit(1576383757.300:79798): avc: denied { map } for pid=21441 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2834.668426][ T27] audit: type=1400 audit(1576383757.310:79799): avc: denied { map } for pid=21424 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) [ 2834.829653][ T27] audit: type=1400 audit(1576383757.320:79800): avc: denied { map } for pid=21424 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:39 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 04:22:39 executing program 1: timer_create(0xb, &(0x7f00000000c0)={0x0, 0x0, 0x1}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 04:22:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0x0) [ 2835.067518][ T27] audit: type=1400 audit(1576383757.320:79801): avc: denied { map } for pid=21449 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:39 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 04:22:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xa, 0x80}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:22:40 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x0) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 04:22:40 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 04:22:40 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x100) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f00000003c0)={0xffffffff, {{0xa, 0x4e24, 0xfff, @ipv4={[], [], @remote}, 0x7f}}}, 0x88) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='oom_score_adj\x00') dup2(r2, r4) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000640)={&(0x7f0000000c80)=ANY=[@ANYRES16, @ANYBLOB="0002aeba038aaddb527f1fb54caa29c343162bbd7000fedbdf25020000229a0014000100fe8000000000000000000000000000bbca4f0375238d9b9442a1f848c9f51c49b8b902e242395b081f9d5a7c2d786b9f268fd8b0aaf1aa4d6bfc5078c07ff577ce903a1d9fb529c484c7c80ac96615b6ddf9e46b"], 0x2}, 0x1, 0x0, 0x0, 0x48000}, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r5 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000002c40), 0x299, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x100) 04:22:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='oom_score_adj\x00') dup2(r2, r3) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x12100, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000740)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000640)={&(0x7f0000000c80)=ANY=[@ANYBLOB="2800920061470d4f87e1e67227dab977c25475407dc92301d115786a7b58267caaac03f91e908cd575fe61b93beca3df04632407af91f1ca1fc4880cc5ceda535332d6145516ce019484bcc20e4968cfb230ac", @ANYRES16=r4], 0x2}, 0x1, 0x0, 0x0, 0x48000}, 0x40) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20008001) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r5 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000002c40), 0x299, 0x0) r6 = open(&(0x7f0000000000)='./file0\x00', 0x1a11a0, 0x0) ioctl$KDMKTONE(r6, 0x4b30, 0x100) 04:22:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0x400000b8) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) 04:22:41 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$alg(0x26, 0x5, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x100) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='oom_score_adj\x00') dup2(0xffffffffffffffff, r2) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r3 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000002c40), 0x299, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x100) 04:22:41 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 04:22:42 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x1000002, 0x0) chdir(&(0x7f0000000280)='./file0\x00') mknod(&(0x7f0000000000)='./bus\x00', 0xffe, 0x0) clone(0x21000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) 04:22:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0x400000b8) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) 04:22:42 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) [ 2838.288300][ T27] kauditd_printk_skb: 159 callbacks suppressed [ 2838.288315][ T27] audit: type=1400 audit(1576383762.368:79961): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2838.476120][ T27] audit: type=1400 audit(1576383762.427:79962): avc: denied { map } for pid=22371 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2838.626005][ T27] audit: type=1400 audit(1576383762.427:79963): avc: denied { map } for pid=22371 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) [ 2838.857939][ T27] audit: type=1400 audit(1576383762.427:79964): avc: denied { map } for pid=22371 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:43 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) [ 2839.010708][ T27] audit: type=1400 audit(1576383762.477:79965): avc: denied { map } for pid=22371 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2839.242758][ T27] audit: type=1400 audit(1576383762.517:79966): avc: denied { map } for pid=22371 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0x400000b8) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) [ 2839.466410][ T27] audit: type=1400 audit(1576383762.596:79967): avc: denied { map } for pid=22371 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2839.671954][ T27] audit: type=1400 audit(1576383762.596:79968): avc: denied { map } for pid=22411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x350f5497}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) [ 2839.851885][ T27] audit: type=1400 audit(1576383762.616:79969): avc: denied { map } for pid=22411 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2840.019723][T22582] audit: audit_backlog=65 > audit_backlog_limit=64 04:22:44 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 04:22:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x400000b8) ptrace$pokeuser(0x6, r0, 0x0, 0x0) 04:22:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x24, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x80008f44, 0x2}, 0x40, 0xffffffffffffffff, 0x0, 0x0, 0x7fffffff, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000380), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, r4, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) msgget$private(0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00', 0x4}) ioctl$UI_DEV_CREATE(r5, 0x5501) syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) memfd_create(&(0x7f0000000280)='^\x00', 0x0) ioctl$PPPIOCSFLAGS1(r6, 0x40047459, &(0x7f00000003c0)=0x1764294) preadv(r6, &(0x7f0000000140)=[{&(0x7f0000000000)=""/2, 0x2}], 0x1, 0x0) sendfile(r6, 0xffffffffffffffff, 0x0, 0x102002700) r7 = inotify_init() dup2(r7, r5) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00'}) r8 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r8, 0x0) setsockopt$inet6_tcp_buf(r8, 0x6, 0x0, &(0x7f0000000440)="598d83cd4a519ef3469e2f3d92a0e0d6a2bff741c3b036735be1d27209d22986c82fc7af568d1175e828069621db9b8ee9eaf0919d1ee7e6d8be8606d004b9e8b92d61d196837e5d35ff6437d7ac0e74bbcec2bd61f8d1e0bce2db2e2d4d4b9071cb03b80093314611837e1911a37ab4aa3ff63210c0a52d9589d6d98465514c9a2fc2", 0x83) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000100) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) 04:22:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x24, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x80008f44, 0x2}, 0x40, 0xffffffffffffffff, 0x0, 0x0, 0x7fffffff, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000380), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, r4, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) msgget$private(0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00', 0x4}) ioctl$UI_DEV_CREATE(r5, 0x5501) syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) memfd_create(&(0x7f0000000280)='^\x00', 0x0) ioctl$PPPIOCSFLAGS1(r6, 0x40047459, &(0x7f00000003c0)=0x1764294) preadv(r6, &(0x7f0000000140)=[{&(0x7f0000000000)=""/2, 0x2}], 0x1, 0x0) sendfile(r6, 0xffffffffffffffff, 0x0, 0x102002700) r7 = inotify_init() dup2(r7, r5) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00'}) r8 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r8, 0x0) setsockopt$inet6_tcp_buf(r8, 0x6, 0x0, &(0x7f0000000440)="598d83cd4a519ef3469e2f3d92a0e0d6a2bff741c3b036735be1d27209d22986c82fc7af568d1175e828069621db9b8ee9eaf0919d1ee7e6d8be8606d004b9e8b92d61d196837e5d35ff6437d7ac0e74bbcec2bd61f8d1e0bce2db2e2d4d4b9071cb03b80093314611837e1911a37ab4aa3ff63210c0a52d9589d6d98465514c9a2fc2", 0x83) lseek(0xffffffffffffffff, 0x0, 0x3) dup2(0xffffffffffffffff, 0xffffffffffffffff) 04:22:45 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 04:22:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xfffffec5}}], 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8000, 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000180)={0x7, 0x4d, 0x2}, 0x7) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r1, &(0x7f00000017c0), 0x1b4, 0x0) 04:22:46 executing program 3: 04:22:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x400000b8) ptrace$pokeuser(0x6, r0, 0x0, 0x0) 04:22:46 executing program 1: 04:22:47 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 04:22:47 executing program 3: [ 2843.354305][ T27] kauditd_printk_skb: 181 callbacks suppressed [ 2843.354319][ T27] audit: type=1400 audit(1576383767.386:80146): avc: denied { map } for pid=23190 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:47 executing program 5: [ 2843.550279][ T27] audit: type=1400 audit(1576383767.435:80147): avc: denied { watch } for pid=12236 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:22:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x400000b8) ptrace$pokeuser(0x6, r0, 0x0, 0x0) 04:22:47 executing program 1: [ 2843.760240][ T27] audit: type=1400 audit(1576383767.445:80148): avc: denied { map } for pid=23190 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2843.926743][ T27] audit: type=1400 audit(1576383767.475:80149): avc: denied { map } for pid=23190 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:48 executing program 0: [ 2844.152788][ T27] audit: type=1400 audit(1576383767.475:80150): avc: denied { map } for pid=23190 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2844.302485][ T27] audit: type=1400 audit(1576383767.554:80151): avc: denied { map } for pid=23190 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:48 executing program 3: [ 2844.484768][ T27] audit: type=1400 audit(1576383767.554:80152): avc: denied { open } for pid=23204 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 04:22:48 executing program 5: 04:22:48 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) [ 2844.664557][ T27] audit: type=1400 audit(1576383767.644:80153): avc: denied { map } for pid=23190 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:48 executing program 1: [ 2844.847631][ T27] audit: type=1400 audit(1576383767.644:80154): avc: denied { map } for pid=23190 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:49 executing program 4: [ 2845.058038][ T27] audit: type=1400 audit(1576383767.713:80155): avc: denied { map } for pid=23190 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:49 executing program 0: 04:22:49 executing program 3: 04:22:49 executing program 5: 04:22:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 04:22:49 executing program 1: 04:22:50 executing program 4: 04:22:50 executing program 0: 04:22:50 executing program 5: 04:22:50 executing program 3: 04:22:50 executing program 1: 04:22:51 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 04:22:51 executing program 4: 04:22:51 executing program 3: 04:22:51 executing program 0: 04:22:51 executing program 5: 04:22:51 executing program 1: 04:22:52 executing program 4: 04:22:52 executing program 0: 04:22:52 executing program 3: 04:22:52 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) [ 2848.478704][ T27] kauditd_printk_skb: 157 callbacks suppressed [ 2848.478717][ T27] audit: type=1400 audit(1576383772.473:80313): avc: denied { map } for pid=23340 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:52 executing program 5: [ 2848.719746][ T27] audit: type=1400 audit(1576383772.473:80314): avc: denied { map } for pid=23340 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2848.881108][ T27] audit: type=1400 audit(1576383772.493:80315): avc: denied { map } for pid=23344 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:52 executing program 1: [ 2849.034711][ T27] audit: type=1400 audit(1576383772.493:80316): avc: denied { map } for pid=23344 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:53 executing program 4: [ 2849.185386][ T27] audit: type=1400 audit(1576383772.523:80317): avc: denied { map } for pid=23340 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000040)=0x10, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000100)=0x10, 0x4) 04:22:53 executing program 3: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x9004c0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) clone(0x40000000200, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='auxv\x00') pread64(r0, 0x0, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x27e, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) [ 2849.407706][ T27] audit: type=1400 audit(1576383772.523:80318): avc: denied { map } for pid=23340 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2849.574808][ T27] audit: type=1400 audit(1576383772.563:80319): avc: denied { map } for pid=23344 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 04:22:53 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'erspan0\x00', 0x2}, 0x18) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x400, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffc}) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 2849.728593][ T27] audit: type=1400 audit(1576383772.563:80320): avc: denied { map } for pid=23344 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2849.882686][ T27] audit: type=1400 audit(1576383772.612:80321): avc: denied { map } for pid=23344 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:54 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0xffffffffffffffff, 0x0, 0x40000000, 0x0) [ 2850.039622][ T27] audit: type=1400 audit(1576383772.682:80322): avc: denied { map } for pid=23344 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 04:22:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 04:22:54 executing program 0: write(0xffffffffffffffff, &(0x7f0000000140)="2400000052001f0014f9f407000904000a00071010000100feffffff08", 0x1d) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00\x00\x00\x06\x10\x00', 0x420000015001}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000140)={0x0, 'syzkaller1\x00'}) 04:22:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:22:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) 04:22:55 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000000)={@empty, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @local, @mcast1, @empty, @mcast1}}}}, 0x0) 04:22:55 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x1, 0x0) write$UHID_INPUT2(r0, 0x0, 0x0) 04:22:56 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 04:22:56 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(0xffffffffffffffff, r0, 0x0, 0x80000003) lseek(r0, 0x2, 0x4) 04:22:56 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:22:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde", 0x21}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 04:22:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000015c0)={0x1, 0x70, 0x3, 0x3, 0x6, 0x2, 0x0, 0xffffffffffffffc0, 0x2, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x1, @perf_bp={&(0x7f0000000500), 0x8}, 0x4, 0x403, 0x5, 0xd, 0x1, 0x72f1eaa5, 0xb33}, r0, 0x6, 0xffffffffffffffff, 0x2) r1 = socket$kcm(0xa, 0x100000000000001, 0x0) sendmsg$kcm(r1, &(0x7f0000000580)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0}, 0x200008c2) r2 = socket$kcm(0xa, 0x100000000000001, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0x2b, 0x1, 0x0) close(r4) sendmsg$kcm(r4, &(0x7f0000000580)={&(0x7f00000000c0)=@un=@abs={0x0, 0x0, 0x1f}, 0x80, 0x0, 0x0, 0x0, 0x3ae}, 0x0) recvmsg(r2, &(0x7f00000003c0)={&(0x7f0000007500)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000400)=""/77}, {&(0x7f00000005c0)=""/4096, 0x3b6}], 0x1b4}, 0xe0) sendmsg$kcm(r1, &(0x7f0000007800)={&(0x7f0000007640)=@ll={0x11, 0x15, r5, 0x1, 0x9, 0x6, @local}, 0x80, &(0x7f0000007740)=[{&(0x7f00000076c0)="9bf5b3f7ce37cf5469e97eacb88997f0e6649e35a3012d529950283eac8074ac2360cd36a90ac69e9215ce12378327325bc879635c86cabe871cd97efacc5a7a801fb73c5c1da8e26f7d6d08addd15c630884705b1e7454e23ab53ecd5148455c85d6f918ab89eedef2dec2af368cd15", 0x70}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x70}, 0x800) r6 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) sendmsg$kcm(r6, &(0x7f0000000580), 0x0) socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0x2b, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x7) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 04:22:57 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) [ 2853.538475][ T27] kauditd_printk_skb: 154 callbacks suppressed [ 2853.538489][ T27] audit: type=1400 audit(1576383777.481:80477): avc: denied { map } for pid=24010 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2853.695199][ T27] audit: type=1400 audit(1576383777.531:80478): avc: denied { map } for pid=24010 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2853.816091][ T27] audit: type=1400 audit(1576383777.551:80479): avc: denied { open } for pid=24011 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 04:22:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 2854.005510][ T27] audit: type=1400 audit(1576383777.551:80480): avc: denied { map } for pid=24010 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2854.219521][ T27] audit: type=1400 audit(1576383777.571:80481): avc: denied { map } for pid=24010 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000380)=""/201, 0xc9}], 0x1, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) [ 2854.421309][ T27] audit: type=1400 audit(1576383777.620:80482): avc: denied { map } for pid=24010 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:58 executing program 4: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x67faf42d5e4f3ace}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000001200)='/dev/vcsa#\x00', 0x1, 0x102) fcntl$setstatus(r1, 0x4, 0x2000) read$alg(r1, &(0x7f0000000000)=""/200, 0xc8) r2 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) write(r3, &(0x7f0000000600)="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", 0xe00) sendfile(r3, 0xffffffffffffffff, 0x0, 0x12000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000200)={{0x1, 0x0, @identifier="11871125300886dbb40752969a589925"}}) socket$inet6(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040), 0x15f, 0x0) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f0000000140), &(0x7f0000000180)=0x4) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x4) [ 2854.632585][ T27] audit: type=1400 audit(1576383777.630:80483): avc: denied { open } for pid=24012 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 2854.840932][ T27] audit: type=1400 audit(1576383777.630:80484): avc: denied { kernel } for pid=24012 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 04:22:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev}, 0x10) symlinkat(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x424, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{0x0}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) gettid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfdbe) [ 2854.946544][T24360] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2854.969215][T24281] audit: audit_backlog=65 > audit_backlog_limit=64 04:22:59 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xc8c0, 0x0, 0x0) close(r0) 04:22:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)=""/121, 0x79}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 04:22:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)=""/121, 0x79}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)=""/180, 0xb4}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xd051, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 04:23:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)=""/121, 0x79}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0xa06, 0x0) ppoll(&(0x7f0000000600)=[{r3}], 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 04:23:00 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xc8c0, 0x0, 0x0) close(r0) 04:23:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)=""/121, 0x79}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)=""/180, 0xb4}, {0x0}, {0x0}], 0x3}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xd051, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) ppoll(&(0x7f0000000600)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 04:23:01 executing program 3: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:23:01 executing program 0: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffff4c5, 0xffffffffffffff95}) syz_emit_ethernet(0x2a, &(0x7f00000002c0)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, @udp={0x0, 0x4305, 0x8}}}}}, 0x0) 04:23:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xc8c0, 0x0, 0x0) close(r0) 04:23:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000000)=@v2={0x2, @adiantum, 0x0, [], "c922a4547b00b2c47ec4a794747704d1"}) ioctl$sock_SIOCETHTOOL(r0, 0x89f2, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000000)=ANY=[]}) 04:23:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f00000000c0)=ANY=[@ANYPTR64, @ANYRESHEX]}) [ 2858.653972][ T27] kauditd_printk_skb: 210 callbacks suppressed [ 2858.653984][ T27] audit: type=1400 audit(1576383782.549:80676): avc: denied { open } for pid=25198 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 2858.890922][ T27] audit: type=1400 audit(1576383782.559:80677): avc: denied { kernel } for pid=25198 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 04:23:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) [ 2859.106141][ T27] audit: type=1400 audit(1576383782.589:80678): avc: denied { map } for pid=25178 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2859.258609][ T27] audit: type=1400 audit(1576383782.589:80679): avc: denied { map } for pid=25178 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:03 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180), 0x0, 0xc8c0, 0x0, 0x0) close(r0) [ 2859.485616][ T27] audit: type=1400 audit(1576383782.618:80680): avc: denied { map } for pid=25221 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="d014b380fcf884281c06ee007e5e4a5c2dc9fd5e855be1d9", 0x18, 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000000)=ANY=[]}) 04:23:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000000)=@v2={0x2, @adiantum, 0x0, [], "c922a4547b00b2c47ec4a794747704d1"}) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000000)=ANY=[]}) [ 2859.613852][ T27] audit: type=1400 audit(1576383782.618:80681): avc: denied { map } for pid=25221 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:03 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="ee9420fbc96f2333cd9c8e9aa5c7efeb10c9f91e9a89ea"]}) [ 2859.814631][ T27] audit: type=1400 audit(1576383782.618:80682): avc: denied { map } for pid=25221 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2859.964470][ T27] audit: type=1400 audit(1576383782.688:80683): avc: denied { map } for pid=25221 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2860.146531][ T27] audit: type=1400 audit(1576383782.708:80684): avc: denied { map } for pid=25221 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) [ 2860.334914][ T27] audit: type=1400 audit(1576383782.727:80685): avc: denied { watch } for pid=11810 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=1134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:23:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x0}) 04:23:04 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180), 0x0, 0xc8c0, 0x0, 0x0) close(r0) 04:23:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) r0 = semget$private(0x0, 0x4, 0x0) semctl$GETPID(r0, 0x3, 0xb, 0x0) 04:23:05 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) epoll_create1(0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x10006, 0x0, 0x0, 0x50000}]}) r0 = syz_open_procfs(0x0, 0x0) write$cgroup_type(r0, 0x0, 0x0) 04:23:05 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x4000000000002, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 04:23:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) 04:23:06 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180), 0x0, 0xc8c0, 0x0, 0x0) close(r0) 04:23:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 04:23:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) 04:23:06 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x50000}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 04:23:07 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\Ah', 0x3, 0xc8c0, 0x0, 0x0) close(r0) 04:23:07 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) 04:23:07 executing program 4: 04:23:07 executing program 3: [ 2863.722467][ T27] kauditd_printk_skb: 153 callbacks suppressed [ 2863.722482][ T27] audit: type=1400 audit(1576383787.587:80839): avc: denied { map } for pid=26190 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2863.872657][ T27] audit: type=1400 audit(1576383787.636:80840): avc: denied { map } for pid=26221 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:07 executing program 5: [ 2864.065303][ T27] audit: type=1400 audit(1576383787.656:80842): avc: denied { map } for pid=26190 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2864.238591][ T27] audit: type=1400 audit(1576383787.636:80841): avc: denied { map } for pid=26221 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2864.496772][ T27] audit: type=1400 audit(1576383787.686:80843): avc: denied { map } for pid=26221 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\Ah', 0x3, 0xc8c0, 0x0, 0x0) close(r0) 04:23:08 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) [ 2864.646027][ T27] audit: type=1400 audit(1576383787.726:80844): avc: denied { map } for pid=26221 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:08 executing program 4: 04:23:08 executing program 3: [ 2864.819397][ T27] audit: type=1400 audit(1576383787.726:80845): avc: denied { map } for pid=26221 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2864.969591][ T27] audit: type=1400 audit(1576383787.835:80846): avc: denied { map } for pid=26221 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2865.146217][ T27] audit: type=1400 audit(1576383787.874:80847): avc: denied { map } for pid=26221 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2865.327603][ T27] audit: type=1400 audit(1576383788.182:80848): avc: denied { watch } for pid=11812 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62840 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:23:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 04:23:09 executing program 5: 04:23:09 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) 04:23:09 executing program 4: 04:23:09 executing program 3: 04:23:09 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\Ah', 0x3, 0xc8c0, 0x0, 0x0) close(r0) 04:23:09 executing program 5: 04:23:10 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) 04:23:10 executing program 4: 04:23:10 executing program 3: 04:23:10 executing program 5: 04:23:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhH', 0x4, 0xc8c0, 0x0, 0x0) close(r0) 04:23:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 04:23:12 executing program 3: 04:23:12 executing program 4: 04:23:12 executing program 5: 04:23:12 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhH', 0x4, 0xc8c0, 0x0, 0x0) close(r0) 04:23:12 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) 04:23:12 executing program 3: 04:23:12 executing program 4: [ 2868.784250][ T27] kauditd_printk_skb: 158 callbacks suppressed [ 2868.784266][ T27] audit: type=1400 audit(1576383792.605:81007): avc: denied { map } for pid=26575 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:12 executing program 5: [ 2868.977899][ T27] audit: type=1400 audit(1576383792.694:81008): avc: denied { map } for pid=26575 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2869.169561][ T27] audit: type=1400 audit(1576383792.754:81009): avc: denied { map } for pid=26575 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2869.387936][ T27] audit: type=1400 audit(1576383792.754:81010): avc: denied { map } for pid=26575 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2869.593078][ T27] audit: type=1400 audit(1576383792.992:81011): avc: denied { map } for pid=26579 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:13 executing program 0: 04:23:13 executing program 4: [ 2869.814994][ T27] audit: type=1400 audit(1576383793.021:81012): avc: denied { map } for pid=26579 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:13 executing program 3: 04:23:13 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhH', 0x4, 0xc8c0, 0x0, 0x0) close(r0) [ 2870.078571][ T27] audit: type=1400 audit(1576383793.051:81013): avc: denied { map } for pid=26579 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:13 executing program 5: [ 2870.288904][ T27] audit: type=1400 audit(1576383793.051:81014): avc: denied { map } for pid=26579 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2870.464692][T26650] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2870.469816][T11807] audit: audit_backlog=65 > audit_backlog_limit=64 04:23:14 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) 04:23:14 executing program 0: 04:23:14 executing program 4: 04:23:14 executing program 3: 04:23:15 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x5, 0x0, 0x0, 0x0) close(r0) 04:23:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xfffffec5}}], 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8000, 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000180)={0x7, 0x4d, 0x2}, 0x7) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) chmod(&(0x7f00000001c0)='./file0\x00', 0x47b5b88533cade1) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r1, &(0x7f00000017c0), 0x1b4, 0x0) 04:23:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xfffffec5}}], 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8000, 0x1) write$P9_RUNLINKAT(r0, &(0x7f0000000180)={0x7, 0x4d, 0x2}, 0x7) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) chmod(&(0x7f00000001c0)='./file0\x00', 0x47b5b88533cade1) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r1, &(0x7f00000017c0), 0x1b4, 0x0) 04:23:15 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x18, 0x580781c053106460, 0x0, @remote={0xfe, 0x80, [0x29c, 0x58, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2], 0xffffffffffffffff}, @local, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, [], @local}}}}}}, 0x0) 04:23:15 executing program 4: add_key$user(&(0x7f00000000c0)='user\x00', 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x4, &(0x7f0000000300)=[{0x0, 0x0, 0x20}, {&(0x7f0000000100)="fece2c262c7304f17ba2a84e300af9fce68ad901940e8fb2fc103c0989d4962eb1058614416279921c65a6b86f8678221b3f600a30adc7b2ab0fd89456b2bba69deb1a608ff90c5a89221773d8bac71b495a527e7939994a8044f68c9caeff320dac63aa6480df05af610d30c181aa40533031e53c4300c3fb73b999d01f714d", 0x80, 0x200}, {&(0x7f0000000180)="ca5237a3b057af6af9c39f7d6543f365860563c9b11d8538d2a721b842b7210c75fb9db6a65b0cc754d103de68ba3f324e1759ddb978b40c21697c5ebc288d536def00000002ec552f409a2489604a98077a6f3551e89695192402e09c3d6250e6253c6acc01839b", 0x68, 0x7}, {&(0x7f0000000200), 0x0, 0x7}]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x121000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) 04:23:16 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x5, 0x0, 0x0, 0x0) close(r0) 04:23:16 executing program 1: socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) 04:23:16 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) msgget$private(0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2873.429347][T26889] Dev loop4: unable to read RDB block 2 04:23:17 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x5, 0x0, 0x0, 0x0) close(r0) 04:23:17 executing program 5: ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000300)={0x6, 'team0\x00'}) syz_open_procfs(0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) [ 2873.502444][T26889] loop4: unable to read partition table [ 2873.559280][T26889] loop4: partition table beyond EOD, truncated [ 2873.616525][T26889] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2873.839211][ T27] kauditd_printk_skb: 186 callbacks suppressed [ 2873.839226][ T27] audit: type=1400 audit(1576383797.623:81197): avc: denied { map } for pid=26976 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2874.078769][ T27] audit: type=1400 audit(1576383797.692:81198): avc: denied { map } for pid=26976 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:17 executing program 1: socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) [ 2874.340931][ T27] audit: type=1400 audit(1576383797.762:81199): avc: denied { map } for pid=26994 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:18 executing program 4: r0 = creat(&(0x7f0000000480)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 2874.559964][ T27] audit: type=1400 audit(1576383797.772:81200): avc: denied { map } for pid=26990 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:18 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(0x0, 0x2c0882, 0x0) ftruncate(r0, 0x208200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./bus/file0\x00'}, 0xffffffffffffffab) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_int(r3, 0x6, 0x1b, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000084000/0x1000)=nil) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@initdev, @in=@empty}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) [ 2874.868106][ T27] audit: type=1400 audit(1576383797.781:81201): avc: denied { map } for pid=26990 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2875.038214][ T27] audit: type=1400 audit(1576383797.791:81202): avc: denied { map } for pid=26994 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:18 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(0xffffffffffffffff) [ 2875.221297][ T27] audit: type=1400 audit(1576383797.791:81203): avc: denied { map } for pid=26976 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0'}, 0xb) openat$ipvs(0xffffffffffffff9c, &(0x7f0000002940)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000008, 0x12, &(0x7f00000001c0)={0x77359400}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, 0x0) write$P9_RLINK(r1, &(0x7f0000000280)={0x11a}, 0x269) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="545587fcb9f58dd83bd908e1365d0a0ffa907452ca57729792ba743cc4a9416ef656851ba4d264bb19605ede3d6bfb67bebb66295ee0a3d70f2b71775787a1e9e5fe7852c2bf3ae2d8a55401620308ab5d2b418e5ad43c455a98d136d2f0b6856f056419bd51811f17593d82959b", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x6, @local}}, 0x2}, &(0x7f0000000200)=0x90) [ 2875.382009][ T27] audit: type=1400 audit(1576383797.811:81204): avc: denied { watch } for pid=12236 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:23:19 executing program 1: socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRES16]}) [ 2875.525472][ T27] audit: type=1400 audit(1576383797.811:81205): avc: denied { map } for pid=26976 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2875.669414][ T27] audit: type=1400 audit(1576383797.821:81206): avc: denied { map } for pid=26990 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:19 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x342, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, r1+30000000}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 04:23:20 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(0xffffffffffffffff) 04:23:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x5, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:23:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, 0x0) 04:23:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast2}}}}}, 0x0) 04:23:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee405dc09000f00fe070801000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 04:23:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000002100)=@ax25={{0x3, @bcast}, [@remote, @default, @bcast, @rose, @default, @rose, @remote, @rose]}, 0x80, &(0x7f0000002440)=[{&(0x7f0000002180)=""/254, 0xfe}, {0x0}], 0x2, &(0x7f0000002480)=""/184, 0xb8}, 0x2}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f0000000180)='./bus\x00', 0x141842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) 04:23:21 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, 0x0) 04:23:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1a) sendto$inet6(r0, 0x0, 0xfffffffffffffc69, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setuid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(0xffffffffffffffff) [ 2878.003876][T27791] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:23:21 executing program 5: add_key$user(&(0x7f00000000c0)='user\x00', 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x4, &(0x7f0000000300)=[{&(0x7f0000000000)="a73d70b27fcca411c3811825e911140298174c844f4904ec38a8111a03b949f0c2041095dca78075bc56afed4fab42648c832dae1c9abd52912c7fdb30cd6e0d75bf9a74a7ab24ddff393214e30c6bbbc0d49008ffa1b8f4a5743e13f995bfd5dbaa41c322a77c7a51c987dc177705d3f0151454eb0b534af441859b60fc8bc9da1aef53ba78a6bf30259b529177d79179e07f8f5bda9454fe3fecc3f20b14f8aa9bd84c8ae0b4366cad80c0e1e92541c45000831fca833d361eb5", 0xbb, 0x20}, {&(0x7f0000000100)="fece2c262c7304f17ba2a84e300af9fce68ad901940e8fb2fc103c0989d4962eb1058614416279921c65a6b86f8678221b3f600a30adc7b2ab0fd89456b2bba69deb1a608ff90c5a89221773d8bac71b495a527e7939994a8044f68c9caeff320dac63aa6480df05af610d30c181aa40533031e53c4300c3fb73b999d01f714d", 0x80}, {&(0x7f0000000180)="ca5237a3b057af6af9c39f7d6543f365860563c9b11d8538d2a721b842b7210c75fb9db6a65b0cc754d103de68ba3f324e1759ddb978b40c21697c5ebc288d536def00000002ec552f409a2489604a98077a6f3551e89695192402e09c3d6250e6253c6acc01839b", 0x68, 0x7}, {&(0x7f0000000200)="53889ee6baa41a14abada62e2d99cdad7e99261096e746dbf2fa4d5806b2acbab48c27142a496934f1c54eea29f1c127e44138641daa2c821c92b51087544dcfebe5cbe501d1d2618fb152a8dd472377b2df8459e51baeab08b2265d0b5e551ed5fe4a822ea46af299f062db059d41704907adabcfc709d3ae40ee08930fb11f1f5fce7a3d2a32ab93fcfa5c8923850aa187bdcb53bbc305b76a53c69977093b16d486f9751363d67b0e0b8721968a2d0579899d7b16356cce3cbee0c9ca5dbbdb5565bea1c73b38b4", 0xc9, 0x7}]) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x121000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, &(0x7f0000000300)={0x0, @capture={0x1000, 0x0, {0x3f}}}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) 04:23:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, 0x0) 04:23:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f0000000180)='./bus\x00', 0x141842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) 04:23:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 04:23:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xfffffec5}}], 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000180)={0x7, 0x4d, 0x2}, 0x7) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) [ 2878.903814][ T27] kauditd_printk_skb: 164 callbacks suppressed [ 2878.903829][ T27] audit: type=1400 audit(1576383802.641:81371): avc: denied { watch } for pid=11720 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:23:22 executing program 0: [ 2879.142347][ T27] audit: type=1400 audit(1576383802.780:81372): avc: denied { map } for pid=28079 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2879.283493][ T27] audit: type=1400 audit(1576383802.829:81373): avc: denied { map } for pid=28079 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2879.429121][ T27] audit: type=1400 audit(1576383802.829:81374): avc: denied { map } for pid=28079 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00'}) [ 2879.629113][ T27] audit: type=1400 audit(1576383802.829:81375): avc: denied { map } for pid=28079 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2879.811587][ T27] audit: type=1400 audit(1576383802.928:81376): avc: denied { map } for pid=28079 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2879.975416][ T27] audit: type=1400 audit(1576383802.958:81377): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=1134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:23:23 executing program 0: 04:23:24 executing program 5: [ 2880.229391][ T27] audit: type=1400 audit(1576383802.988:81378): avc: denied { map } for pid=28079 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2880.353043][ T27] audit: type=1400 audit(1576383802.988:81379): avc: denied { map } for pid=28079 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2880.574834][ T27] audit: type=1400 audit(1576383803.067:81380): avc: denied { map } for pid=28079 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:24 executing program 4: 04:23:24 executing program 0: 04:23:24 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00'}) 04:23:25 executing program 3: 04:23:25 executing program 5: 04:23:25 executing program 4: 04:23:25 executing program 0: 04:23:26 executing program 2: 04:23:26 executing program 3: 04:23:26 executing program 5: 04:23:26 executing program 4: 04:23:26 executing program 0: 04:23:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00'}) 04:23:27 executing program 5: 04:23:27 executing program 3: 04:23:27 executing program 4: [ 2883.961382][ T27] kauditd_printk_skb: 134 callbacks suppressed [ 2883.961397][ T27] audit: type=1400 audit(1576383807.649:81515): avc: denied { map } for pid=28639 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:27 executing program 2: [ 2884.154432][ T27] audit: type=1400 audit(1576383807.689:81516): avc: denied { map } for pid=28642 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:28 executing program 0: 04:23:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX]}) [ 2884.416550][ T27] audit: type=1400 audit(1576383807.738:81517): avc: denied { map } for pid=28642 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:28 executing program 5: [ 2884.618018][ T27] audit: type=1400 audit(1576383807.748:81518): avc: denied { map } for pid=28643 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2884.779227][ T27] audit: type=1400 audit(1576383807.748:81519): avc: denied { map } for pid=28643 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2884.942938][ T27] audit: type=1400 audit(1576383807.748:81520): avc: denied { map } for pid=28643 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:28 executing program 2: 04:23:28 executing program 3: 04:23:28 executing program 4: [ 2885.152234][ T27] audit: type=1400 audit(1576383807.748:81521): avc: denied { map } for pid=28643 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2885.152261][ T27] audit: type=1400 audit(1576383807.778:81522): avc: denied { map } for pid=28639 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_rm_watch(r0, 0x0) [ 2885.152286][ T27] audit: type=1400 audit(1576383807.808:81523): avc: denied { map } for pid=28642 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[@ANYRES32]}) [ 2885.152311][ T27] audit: type=1400 audit(1576383807.808:81524): avc: denied { map } for pid=28642 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:29 executing program 5: getpid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:23:29 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000000301fffb808fdb003d88bfa4a81bae1be149"], 0x16}}, 0x0) recvmmsg(r3, &(0x7f00000013c0), 0x4a5, 0x200002, &(0x7f0000000c40)={0x77359400}) 04:23:29 executing program 2: getpid() recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x22f, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:23:30 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) connect$unix(r1, &(0x7f00000002c0)=@abs, 0x6e) 04:23:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000200)=ANY=[]}) 04:23:30 executing program 0: r0 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0xc1328430ba889503, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:23:30 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x42, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000600)={0x0, &(0x7f00000003c0)=""/221}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000085000000bfa300000000000007030000fdfdfff67a0af0fff9ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000024000000b7050000020000006a0a00fe00000000850000000a000000b70000001000000095000000000000009cc6b3fcbd3977af58671e40d89a1ad62c7d38f481de5b6f196e061da2f8b5791c6238975d43a4505f805303e089fc889f3c530cf08e467b592f868ee3b0a434df0a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa3b1d4e984c46ea7e2a447a36fa48ffc5662403e1b2be40ea5ba80601c47141a9872971c7c56c374e8e97a1c22aef763e3b3d8f0979bd10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8f9de9ca3c00cb9bf4e418d07fa22f0610a70f2bdf4000000000000b0c2b40dd8e263f63223b7b80197aa74c5b8f5f301fc3f755519ab41f45346b100000000000000000089e399f6609876b5887437a172fbc02a740675298b79dc194e533583411c62aeaa09058fc20200b5d3e26a5ab2728a0481e9f0da43bb6cfb851ce5a9ff19ffcafe3e64be033c9d2f972cc93c1c13caec04a347c24a9fb6a6991ddb737d527d6acb15426415b6e8b14f822e86067a5e991c3bd14984dfa2c6e94bd0339454c13ad3c328a182c15d7a61920350a0073fb74df8c2430d11d56cf173ffe50be1c35f1431c6bab14781ea588848c9f3e4a36787330ec0394679c1febe04e7f3477045d0243e55cae24c2eece678c5f8507d514afefbde7f584274a80bbc31f8bbe39426e06c2ce76b0dd097a83407cb9dea7357198855d017d11e3065b3e4a46e7fe31f1c272dcc1917e71ad07f331ef48cfe648c8ece317063f86a43e54dd960fca65e16dcfe373aba7757152260210eff07217f5550ba22dce258b1f22448e91a24433c4ac5284009a96e04fec32cfe55d2cb07413daaae0d989fb36f743811d77711c4a7fae6af9aee3144a3fb2c4b36d7e5c900d92bbe1122a34a88795fd2beabcb0e262658e6150ae4ca233c31c8c0edc5daf9cd845d5107caebecc09b9f5ee92bb5666d956e47f72b3bcb5a30f1e02ce6e3431d21f4ed11cb6da4660c27c6ca3025e3df9fa8abfaef058a7bc2d53948ba3a16d71833"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r4, 0x0, 0xe80, 0x0, &(0x7f0000000540)="8d14fb003092bd81ed4e5b534c5747c8", 0x0, 0x1000, 0x0, 0x0, 0x250}, 0x28) 04:23:31 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_SNOOPING={0x8}]}}}]}, 0x3c}}, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket(0x10, 0x80002, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r5, 0x0, 0x4ffe0, 0x0) 04:23:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0xfffffca0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x536e) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") 04:23:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6b) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(r0, r1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) 04:23:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x40000108]}) 04:23:32 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="5300000044a6aeabec8f0000000000000020001000fff64017db9820000000003b18d403ffff633b27e59aa1ebf6ac2506736d17c3f2c876d69901006e265657"], 0x40) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup2(0xffffffffffffffff, r1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001600e7f7bb70197396c17bf323d3", 0x12, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 2888.689531][T29268] netlink: 'syz-executor.3': attribute type 23 has an invalid length. 04:23:32 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fstat(r0, &(0x7f0000000580)) [ 2889.046070][ T27] kauditd_printk_skb: 172 callbacks suppressed [ 2889.046083][ T27] audit: type=1400 audit(1576383812.707:81697): avc: denied { map } for pid=29283 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee405dc09000f00fe070801000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 2889.226590][ T27] audit: type=1400 audit(1576383812.756:81698): avc: denied { map } for pid=29283 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2889.427662][ T27] audit: type=1400 audit(1576383812.776:81699): avc: denied { map } for pid=29283 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2889.635322][ T27] audit: type=1400 audit(1576383812.865:81700): avc: denied { map } for pid=29283 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:33 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000100)=0xfd, 0x4) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = eventfd2(0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4) socketpair$unix(0x1, 0xcdf6231d729c1cb1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x10) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) ftruncate(r7, 0x7fff) sendfile(r1, r7, 0x0, 0x8000fffffffe) [ 2889.836246][ T27] audit: type=1400 audit(1576383812.885:81701): avc: denied { map } for pid=29283 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:33 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000100)=0xfd, 0x4) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4) socketpair$unix(0x1, 0xcdf6231d729c1cb1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) ftruncate(r6, 0x7fff) sendfile(r1, r6, 0x0, 0x8000fffffffe) [ 2890.056479][ T27] audit: type=1400 audit(1576383812.974:81702): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=1135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2890.248770][ T27] audit: type=1400 audit(1576383812.984:81703): avc: denied { map } for pid=29283 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2890.271615][T29605] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2890.459075][ T27] audit: type=1400 audit(1576383812.994:81704): avc: denied { map } for pid=29283 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) 04:23:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) faccessat(0xffffffffffffffff, 0x0, 0x0, 0xa00) [ 2890.679794][ T27] audit: type=1400 audit(1576383813.044:81705): avc: denied { map } for pid=29409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:34 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x1) [ 2890.879685][ T27] audit: type=1400 audit(1576383813.044:81706): avc: denied { map } for pid=29409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:34 executing program 5: prlimit64(0x0, 0xd, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x6, 0x0, 0x3, 0x7}, 0xebc1cdb6b083eaed) recvmmsg(0xffffffffffffffff, &(0x7f0000002c80), 0x3, 0x150, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f00000002c0)={{0x9, 0x7}, 'port1\x00', 0x2, 0x0, 0x7ff, 0x1, 0x3, 0x5}) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes256\x00'}, 0x14c) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(0xffffffffffffffff, 0x40046411, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r2, 0x5453, 0x0) [ 2891.748653][T29965] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2891.797113][T29965] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x7c, 0x19e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = dup(r0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) 04:23:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) 04:23:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3f) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x5, 0xfa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 04:23:36 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) 04:23:36 executing program 0: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, 0x0, 0x0, 0x1}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x18) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x100000000000025, &(0x7f0000000440)={@multicast2, @local}, 0xc) [ 2892.991136][T30292] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2893.059174][T30292] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:36 executing program 1: socketpair(0x0, 0x4, 0x1, &(0x7f0000000000)) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000040)=0x401, &(0x7f0000000100)=0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) socket$inet_dccp(0x2, 0x6, 0x0) 04:23:36 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000600)=0x14) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 04:23:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) [ 2894.124095][ T27] kauditd_printk_skb: 163 callbacks suppressed [ 2894.124109][ T27] audit: type=1400 audit(1576383817.734:81870): avc: denied { map } for pid=30488 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) readv(r0, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/234, 0xea}], 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000001900)={{0x100000080}, 'lort1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa6\xd3\xde\xb2\x00', 0xee}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{0x0, 0x1}, {0x80}}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) [ 2894.330007][ T27] audit: type=1400 audit(1576383817.774:81871): avc: denied { map } for pid=30383 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) [ 2894.554779][ T27] audit: type=1400 audit(1576383817.774:81872): avc: denied { map } for pid=30383 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:38 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) readv(r0, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/234, 0xea}], 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000001900)={{0x100000080}, 'lort1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa6\xd3\xde\xb2\x00', 0xee}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{0x0, 0x1}, {0x80}}) close(0xffffffffffffffff) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)=0x6) [ 2894.814689][ T27] audit: type=1400 audit(1576383817.814:81873): avc: denied { map } for pid=30488 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2894.995038][ T27] audit: type=1400 audit(1576383817.824:81874): avc: denied { map } for pid=30488 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x4b564d05, 0x3]}) [ 2895.146096][ T27] audit: type=1400 audit(1576383817.863:81875): avc: denied { map } for pid=30488 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x53adc69e) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x40000108]}) 04:23:38 executing program 5: add_key$user(&(0x7f00000000c0)='user\x00', 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x4, &(0x7f0000000300)=[{&(0x7f0000000000)="a73d70b27fcca411c3811825e911140298174c844f4904ec38a8111a03b949f0c2041095dca78075bc56afed4fab42648c832dae1c9abd52912c7fdb30cd6e0d75bf9a74a7ab24ddff393214e30c6bbbc0d49008ffa1b8f4a5743e13f995bfd5dbaa41c322a77c7a51c987dc177705d3f0151454eb0b534af441859b60fc8bc9da1aef53ba78a6bf30259b529177d79179e07f8f5bda9454fe3fecc3f20b14f8aa9bd84c8ae0b4366cad80c0e1e92541c45000831fca833d361eb5", 0xbb, 0x20}, {&(0x7f0000000100)="fece2c262c7304f17ba2a84e300af9fce68ad901940e8fb2fc103c0989d4962eb1058614416279921c65a6b86f8678221b3f600a30adc7b2ab0fd89456b2bba69deb1a608ff90c5a89221773d8bac71b495a527e7939994a8044f68c9caeff320dac63aa6480df05af610d30c181aa40533031e53c4300c3fb73b999d01f714d", 0x80, 0x200}, {&(0x7f0000000180)="ca5237a3b057af6af9c39f7d6543f365860563c9b11d8538d2a721b842b7210c75fb9db6a65b0cc754d103de68ba3f324e1759ddb978b40c21697c5ebc288d536def00000002ec552f409a2489604a98077a6f3551e89695192402e09c3d6250e6253c6acc01839b", 0x68, 0x7}, {&(0x7f0000000200), 0x0, 0x7}]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x121000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) [ 2895.417359][ T27] audit: type=1400 audit(1576383817.933:81876): avc: denied { map } for pid=30488 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2895.574408][ T27] audit: type=1400 audit(1576383817.943:81877): avc: denied { map } for pid=30511 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2895.719395][T30885] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2895.729419][ T27] audit: type=1400 audit(1576383817.943:81878): avc: denied { map } for pid=30511 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2895.775967][T30885] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2895.873735][ T27] audit: type=1400 audit(1576383817.953:81879): avc: denied { map } for pid=30527 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:39 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) 04:23:40 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x20, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x2}, 0x0, 0x0}}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) write$evdev(r0, &(0x7f0000000040), 0x373) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'team_slave_0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x5c, r6, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}]}, 0x5c}}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r10) ioctl$sock_SIOCDELRT(r9, 0x890c, &(0x7f00000001c0)={0x0, @hci, @xdp={0x2c, 0xa, 0x0, 0x15}, @nl=@kern={0x10, 0x0, 0x0, 0x4000}, 0x57, 0x0, 0x0, 0x0, 0x200, &(0x7f0000000180)='ip6_vti0\x00', 0x5b, 0x400, 0xfff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@initdev, @initdev}, &(0x7f0000000280)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000033c0)={'gre0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000003500)=0xe8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 04:23:40 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000380)='3', 0x1, r0) r2 = add_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)="c7", 0x1, 0xfffffffffffffffc) keyctl$link(0x8, r1, r2) 04:23:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0xa, 0x0, 0x9, 0x2}, 0x10}}, 0x0) 04:23:40 executing program 0: add_key$user(&(0x7f00000000c0)='user\x00', 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x4, &(0x7f0000000300)=[{&(0x7f0000000000)="a73d70b27fcca411c3811825e911140298174c844f4904ec38a8111a03b949f0c2041095dca78075bc56afed4fab42648c832dae1c9abd52912c7fdb30cd6e0d75bf9a74a7ab24ddff393214e30c6bbbc0d49008ffa1b8f4a5743e13f995bfd5dbaa41c322a77c7a51c987dc177705d3f0151454eb0b534af441859b60fc8bc9da1aef53ba78a6bf30259b529177d79179e07f8f5bda9454fe3fecc3f20b14f8aa9bd84c8ae0b4366cad80c0e1e92541c45000831fca833d361eb5", 0x2c8, 0x20}, {&(0x7f0000000100)="fece2c262c7304f17ba2a84e300af9fce68ad901940e8fb2fc103c0989d4962eb1058614416279921c65a6b86f8678221b3f600a30adc7b2ab0fd89456b2bba69deb1a608ff90c5a89221773d8bac71b495a527e7939994a8044f68c9caeff320dac63aa6480df05af610d30c181aa40533031e53c4300c3fb73b999d01f714d", 0x80, 0x200}, {&(0x7f0000000180)="ca5237a3b057af6af9c39f7d6543f365860563c9b11d8538d2a721b842b7210c75fb9db6a65b0cc754d103de68ba3f324e1759ddb978b40c21697c5ebc288d536def00000002ec552f409a2489604a98077a6f3551e89695192402e09c3d6250e6253c6acc01839b", 0x68, 0x7}, {&(0x7f0000000200)="53889ee6baa41a14abada62e2d99cdad7e99261096e746dbf2fa4d5806b2acbab48c27142a496934f1c54eea29f1c127e44138641daa2c821c92b51087544dcfebe5cbe501d1d2618fb152a8dd472377b2df8459e51baeab08b2265d0b5e551ed5fe4a822ea46af299f062db059d41704907adabcfc709d3ae40ee08930fb11f1f5fce7a3d2a32ab93fcfa5c8923850aa187bdcb53bbc305b76a53c69977093b16d486f9751363d67b0e0b8721968a2d0579899d7b16356cce3cbee0c9ca5dbbdb5565bea1c73b38b4", 0xc9, 0x7}]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x121000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, &(0x7f0000000300)={0x0, @capture={0x1000, 0x0, {0x3f}}}) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) 04:23:40 executing program 1: perf_event_open(&(0x7f0000000580)={0x1, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, &(0x7f0000000600)=ANY=[@ANYBLOB="0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004b2191a21e33d97128d2e2c4dda41210808d34a56ffeaa79a280300749cd7b37f293a6dc7c625c6e98c718a11fc3b8cb4b29d031c1311b55b9b13d4b134d6f3645fc817d38f4bb3be7accc0936ade25498f43b785318651b819e5d58ddc9d591d9091930bbd7d4fd7644f99fda9a2d770ea528f3020a211cc45e201f47ad1cede6453a45308a0ce475c6a5ae4456704357b9d0d08afcc8bbba7ef58975fa6bed55fff92aa25e7731252d940ed97b5accb191a915a55bbbfb8e61d9e0b8970bdc65536031abc9a0cd01647f78f0ca470ac4f0dac6"]) dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}}, 0x5c) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x1f, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={0x4, 0x0, 0x0, 0x0, 'syz1\x00'}) 04:23:40 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) 04:23:42 executing program 5: [ 2898.547298][T31456] Dev loop0: unable to read RDB block 2 [ 2898.552989][T31456] loop0: unable to read partition table 04:23:42 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) [ 2898.697988][T31456] loop0: partition table beyond EOD, truncated [ 2898.704652][T31456] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:23:42 executing program 4: 04:23:42 executing program 0: 04:23:42 executing program 3: 04:23:42 executing program 1: [ 2899.238637][ T27] kauditd_printk_skb: 173 callbacks suppressed [ 2899.238652][ T27] audit: type=1400 audit(1576383822.802:82053): avc: denied { watch } for pid=12236 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62840 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2899.457393][ T27] audit: type=1400 audit(1576383822.961:82054): avc: denied { watch } for pid=11812 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:23:43 executing program 5: [ 2899.702961][ T27] audit: type=1400 audit(1576383823.109:82055): avc: denied { map } for pid=31804 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) 04:23:43 executing program 4: [ 2899.897196][ T27] audit: type=1400 audit(1576383823.109:82056): avc: denied { map } for pid=31804 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:43 executing program 3: 04:23:43 executing program 0: [ 2900.116404][ T27] audit: type=1400 audit(1576383823.109:82057): avc: denied { map } for pid=31804 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2900.328136][ T27] audit: type=1400 audit(1576383823.189:82058): avc: denied { map } for pid=31806 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2900.519729][ T27] audit: type=1400 audit(1576383823.189:82059): avc: denied { map } for pid=31806 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:44 executing program 1: [ 2900.711361][ T27] audit: type=1400 audit(1576383823.199:82060): avc: denied { map } for pid=31804 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:44 executing program 5: [ 2900.864919][ T27] audit: type=1400 audit(1576383823.278:82061): avc: denied { map } for pid=31804 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) [ 2901.035692][ T27] audit: type=1400 audit(1576383823.278:82062): avc: denied { map } for pid=31804 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:44 executing program 4: 04:23:44 executing program 3: 04:23:44 executing program 0: 04:23:45 executing program 1: 04:23:45 executing program 5: 04:23:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) 04:23:45 executing program 4: 04:23:45 executing program 3: 04:23:46 executing program 0: 04:23:46 executing program 1: 04:23:46 executing program 5: 04:23:46 executing program 4: 04:23:46 executing program 0: 04:23:46 executing program 2: socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) 04:23:47 executing program 3: 04:23:47 executing program 1: 04:23:47 executing program 5: 04:23:47 executing program 4: 04:23:47 executing program 0: 04:23:47 executing program 2: socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) [ 2904.300504][ T27] kauditd_printk_skb: 163 callbacks suppressed [ 2904.300519][ T27] audit: type=1400 audit(1576383827.820:82226): avc: denied { map } for pid=31848 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:48 executing program 3: [ 2904.520347][ T27] audit: type=1400 audit(1576383827.850:82227): avc: denied { map } for pid=31851 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2904.694343][ T27] audit: type=1400 audit(1576383827.850:82228): avc: denied { map } for pid=31851 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2904.847730][ T27] audit: type=1400 audit(1576383827.880:82229): avc: denied { map } for pid=31846 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:48 executing program 1: 04:23:48 executing program 5: [ 2905.048470][ T27] audit: type=1400 audit(1576383827.899:82230): avc: denied { map } for pid=31851 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:48 executing program 4: [ 2905.222342][ T27] audit: type=1400 audit(1576383827.899:82231): avc: denied { map } for pid=31851 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:48 executing program 0: [ 2905.359876][ T27] audit: type=1400 audit(1576383827.909:82232): avc: denied { map } for pid=31848 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:48 executing program 3: 04:23:49 executing program 2: socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300"/57, 0x39}], 0x1) [ 2905.522409][ T27] audit: type=1400 audit(1576383827.939:82233): avc: denied { map } for pid=31851 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2905.683146][ T27] audit: type=1400 audit(1576383827.939:82234): avc: denied { map } for pid=31846 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2905.843886][ T27] audit: type=1400 audit(1576383828.008:82235): avc: denied { map } for pid=31848 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:49 executing program 1: 04:23:49 executing program 4: 04:23:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0', [{}], 0xa, "e7288dccac1b221edb964d0fc88245552bbaa559a16b311dc209138f305942af8de43f479174d621bf7795d77b9c57e7b41eba3103c8d6ff6fdb73f86ad98a6a0d49efb01abb10a0853c92d19b481ad3f2739dd6839577d71ab2d19829"}, 0x69) openat$ipvs(0xffffffffffffff9c, &(0x7f0000002940)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000008, 0x12, &(0x7f00000001c0)={0x77359400}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000040)=0x3, 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x11a}, 0x269) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) 04:23:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './file0', [{}], 0xa, "e7288dccac1b221edb964d0fc88245552bbaa559a16b311dc209138f305942af8de43f479174d621bf7795d77b9c57e7b41eba3103c8d6ff6fdb73f86ad98a6a0d49efb01abb10a0853c92d19b481ad3f2739d"}, 0x5f) openat$ipvs(0xffffffffffffff9c, &(0x7f0000002940)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(r1, &(0x7f0000002ec0), 0x400000000000008, 0x12, &(0x7f00000001c0)={0x77359400}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000040)=0x3, 0x8) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r2, &(0x7f0000000280)={0x11a}, 0x269) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="545587fcb9f58dd83bd908e1365d0a0ffa907452ca57729792ba743cc4a9416ef656851ba4d264bb19605ede3d6bfb67bebb66295ee0a3d70f2b71775787a1e9e5fe7852c2bf3ae2d8a55401620308ab5d2b418e5ad43c455a98d136d2f0b6856f056419bd51811f17593d82959b81025a7c2e4808dca3e9a1a0ad183e1b4424ea11f4635a0c999a2cd5cc6fb10710b519907b9120d87c45", @ANYRES32=0x0], &(0x7f0000a8a000)=0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x6, @local}}, 0x2, 0x8}, &(0x7f0000000200)=0x90) 04:23:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, 0x0, 0x0) 04:23:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000002ac0)='cpuset@*!\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:23:50 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_elf32(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{0x3}]}, 0x58) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 04:23:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './file0', [{}], 0xa, "e7288dccac1b221edb964d0fc88245552bbaa559a16b311dc209138f305942af8de43f479174d621bf7795d77b9c"}, 0x3a) openat$ipvs(0xffffffffffffff9c, &(0x7f0000002940)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) recvmmsg(r1, &(0x7f0000002ec0), 0x400000000000008, 0x12, &(0x7f00000001c0)={0x77359400}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000040)=0x3, 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x11a}, 0x269) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, 0x0, 0x0) 04:23:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, 0x0, 0x0) 04:23:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) write$binfmt_script(r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000002940)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(r1, &(0x7f0000002ec0), 0x400000000000008, 0x12, &(0x7f00000001c0)={0x77359400}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000040), 0x8) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RLINK(r2, &(0x7f0000000280)={0x11a}, 0x269) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) 04:23:51 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000260007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 04:23:52 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fwL-t\xfc\xaa\x12m\x03\xb9bM\xba\xf1\x02\xf9\xcc`rtA\xa6\x9d\x86\xfc\xd2\x8d\xb6L\xc7Nw\xf9UU#8\xa1\xb7\v\xa4yu\xbc\xb9FnRHm\xf7\xf62B\xf3\xc5\xdbi\x82\xe5\x13\xcd<=_\x88\t\x9c\xd5@\xb5\x8b\xdet\xd1\xa1\x040/eH\xba\xabL\x87Zvy\b4\tqT,[\x852\xc4Yf\xdc]\xcc\x18h\xf2\xbf)\x8eg\f\"-\x1a\x99\x0e\xc3\x1cg\xd2\x8f\xb8\xc9P\x05\xdb\xb6\x1a;]\xa2\xb3\xe1J\xba\xcbK\xe2x\xae9\x85\xc8F\xb4b\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000000)) r7 = socket$netlink(0x10, 0x3, 0x14) pwritev(r7, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000540)}, {&(0x7f0000000140)="d82a63a67db0905d22216f988ad69a815ee05bb5fc3b0679b423b1", 0x1b}, {&(0x7f00000006c0)}, {0x0}], 0x5, 0x0) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40)={r9}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f0000000340)={r9, @in6={{0xa, 0x4e23, 0x8001, @remote}}, 0x5, 0x5, 0xffffffc1}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r6, 0x84, 0x6c, &(0x7f0000001640)={r9, 0xbd, "1f23dd6688e3318021e1917bfa6139c44cfd77f2692f4f341cba1df5a75fec222ce1adf2ea2532d25c290200eafc6a40a9799884c265d25c7ec1124f3ca5b22f7715d361a9d31b15c05a41a4f16a7d88832ca11289bbf6974ad1b9ea3e8ea35eb35edb1c5deff0e9e7c3d393e865487a5652dc2ece1e63b824f1629f82f00f69fd43a6156ebcc7acead280e6a584fd13cb555a111d4f0b0d4d257a19e086cec9eee650827b3432a0ef987e6d2776ca278bd898497a2583ccf09620634e"}, &(0x7f00000001c0)=0xc5) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000001c0)={r9, 0x30, &(0x7f0000000180)=[@in={0x2, 0x4e20, @local}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e22, @local}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000003c0)={r10, 0x4000, 0x9, 0xfff, 0x7, 0x1000}, &(0x7f0000000400)=0x14) pipe2$9p(&(0x7f0000000240), 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x375) keyctl$get_persistent(0x3, r12, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r15, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@local, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0xe8) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r16 = getpid() rt_tgsigqueueinfo(r16, r16, 0x16, &(0x7f00000000c0)) ptrace(0x10, r16) ptrace$setregs(0xd, r16, 0x0, &(0x7f0000000000)) ptrace$setregs(0xf, r16, 0x0, &(0x7f00000002c0)="6fd30f39ce") ptrace$getregset(0x4204, r16, 0x2, &(0x7f0000000280)={0x0}) 04:23:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, 0x0, 0x0) 04:23:52 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, 0x0, 0x0, 0x100001, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f00000000c0)={0x9}) 04:23:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 2909.365824][ T27] kauditd_printk_skb: 163 callbacks suppressed [ 2909.365837][ T27] audit: type=1400 audit(1576383832.858:82399): avc: denied { open } for pid=32383 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 2909.525805][ T27] audit: type=1400 audit(1576383832.858:82400): avc: denied { kernel } for pid=32383 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 2909.525830][ T27] audit: type=1400 audit(1576383832.937:82401): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2909.943775][ T27] audit: type=1400 audit(1576383832.967:82402): avc: denied { map } for pid=32437 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000), 0x0) [ 2910.163005][ T27] audit: type=1400 audit(1576383832.987:82403): avc: denied { map } for pid=32437 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:53 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) dup3(r1, r0, 0x0) [ 2910.380216][ T27] audit: type=1400 audit(1576383833.007:82404): avc: denied { map } for pid=32437 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2910.567936][ T27] audit: type=1400 audit(1576383833.056:82405): avc: denied { open } for pid=32383 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 04:23:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed78d9e2b41fd983f79e65199615207672c59957ab364bf68e6faf05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455a924ed02000000000000007aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866fd9f453c72d4c9804", 0x99}], 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 04:23:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x50000}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000002cc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x3) [ 2910.857012][ T27] audit: type=1400 audit(1576383833.056:82406): avc: denied { kernel } for pid=32383 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 2911.038827][ T27] audit: type=1400 audit(1576383833.086:82407): avc: denied { map } for pid=32437 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2911.219881][ T27] audit: type=1400 audit(1576383833.155:82408): avc: denied { map } for pid=32437 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:54 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000)) 04:23:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000), 0x0) 04:23:55 executing program 4: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x51}, 0x2082}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="7f08040403400900ff010000400001000073c68c07002300b6674c38838e4a810000004a0000000dfe80000000feff000000008407287c00f977df0ed44c5253880bbe0de1724d00000000006bcad0964e69f9efa5c7cea88b044343f72ad8a58202df5add56f4ab88d72dc36156d9cbbc15f7b06e09b7d94c0d0a432f7c231b5ed89132d54196c71f42879e22fa908af7ccb8869fdc7859226d9fa1d6d309538f3afac20dd72afabf79b34258507f729c45ca253afc9d189fe6c8cc17a61bb664e501cb4a98038fde00000000eae0247d92dfde8b0da9bb67c20340d76e98d336d8f1067f85fc7736040000000000000060ba03f9e99e5073fabf016288de11ec3589e1a0f55778aa90b6360bc0a991a247841c84a86fda851f1349e170f56407000000400000005ec903d83fffdc21a18b2896f0fb278349cd1ed02c58f8436b56901eef6b7ac3dd716ecf477803499b1ecf3b7f6754f38fa96894ecc33a00000000000000000fbaf28459615fe061acdeb19f0a1409cccee67757325a060ea2301963b28ca1f0edf583b11f75a2a973a75f85ddfee7c0bfe3be1b9f6b96a8470ff28264de7753ac31cab7914b55e205bf6937a391b92211ebd26e5513a80cfda49712c62ff014d2b4b0df8794e24f03ef697046a4a10edf04dadf52f02ba195e7b78cfe8c3afb2a18ed2db9a7f4ca31903a1c88eba42492addac46de89f6591d64102da645e244b3ad500000008eb8e1c0b85fe4ee33611ea8408ce531a9663838a559fb2f25b9e0c75d73069fd9bb1ec3686d2b54b5fdfee54c23cb23532c4000900f10822abbb8e6d66cb1495d9dcb2454a905fa8133503370d318ef1303583af8de1f0185185ae8547084139bd4f8d13abaabb6f63696f3636c413402d3fd6c247075800d1f13add021efa3bf82d6a40a81b68d1abf5e71c22ecc63cb28f4fddae644e8ed5bf44756d16ce62d73c"], 0x1) setsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fcntl$dupfd(r1, 0x80c, r0) lseek(0xffffffffffffffff, 0x0, 0x3) r2 = open(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r4, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000740)) 04:23:55 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000680)="9e19ad4fe8ba08cd71e99d162079fb3e28b8fa679027f2be1c2c8f4a2d3961d6d83ce56143064b3cb0b368fd7de4bc244119c0003b005879a704caa371481f0269997d248a1b273ff22682aed7adfef01e8f5ace4fefda8f998ac9db61d9c5ac23d67dddf4afd702519661e4778285eb94788a26e817d23d7b912e5a33f56ee819fcbcf84ee6940425fb40aa908e55ad5cb2b34f38fec070ca8d8443928799cb0751e48062e959c56a5c3b1a5d772107fd8da16b33f25198e6e7c4cb92ea74ff59ac3a6d9067e2c763ce633ea5d15c79f7fb", 0xd2) sendmmsg$sock(r0, &(0x7f0000002a80)=[{{&(0x7f0000001100)=@in={0x2, 0x4e24, @loopback}, 0x80, 0x0}}, {{&(0x7f0000002340)=@in6={0xa, 0x4e23, 0x0, @rand_addr="4255fa236856ed16c16d77371a09eec6"}, 0x80, 0x0, 0xffffffffffffffec, &(0x7f0000002540)=[@timestamping={{0x14}}], 0x18}}], 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x80) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(r2, &(0x7f00000001c0)={0x1f, 0x1, {0x0, 0x4, 0x0, 0x8, 0x6, 0x5}, 0x100000001, 0x2838}, 0xe) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000004c0)={r3, 0x9}, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="380000002400e50d0000000000000000000000004389ddfb61f798a23a5ea828a91464", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000059f006000068686e3247e8caba0c981a00000006335aadbcd6bd94205fab18edbb00"], 0x3}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000005c0)={@ipv4={[], [], @loopback}, 0x13, r6}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={@remote, 0x34, r6}) 04:23:55 executing program 5: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x67faf42d5e4f3ace}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r3 = syz_open_dev$vcsa(&(0x7f0000001200)='/dev/vcsa#\x00', 0x1, 0x102) fcntl$setstatus(r3, 0x4, 0x2000) read$alg(r3, &(0x7f0000000000)=""/200, 0xc8) r4 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0xe00) sendfile(r5, r6, 0x0, 0x12000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, &(0x7f0000000200)={{0x1, 0x0, @identifier="11871125300886dbb40752969a589925"}}) socket$inet6(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040), 0x15f, 0x0) getsockopt$SO_TIMESTAMP(r4, 0x1, 0x3f, &(0x7f0000000140), &(0x7f0000000180)=0x4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x4) 04:23:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000), 0x0) 04:23:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x50000}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x3) 04:23:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 04:23:57 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) writev(r0, 0x0, 0x0) lchown(0x0, 0x0, 0x0) 04:23:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="eb7fc86d4f66732e66617400020441000500077008f80000d8c32d9d60c74a6528c15114f984fd8afe1af5ae", 0x8ba2f7b459c9f0fa}], 0x0, 0x0) rmdir(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:23:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 04:23:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) [ 2914.428079][ T27] kauditd_printk_skb: 162 callbacks suppressed [ 2914.428092][ T27] audit: type=1400 audit(1576383837.876:82571): avc: denied { map } for pid=886 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2914.618975][ T27] audit: type=1400 audit(1576383837.896:82572): avc: denied { map } for pid=886 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2914.798538][ T27] audit: type=1400 audit(1576383837.906:82573): avc: denied { map } for pid=886 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2914.939492][ T27] audit: type=1400 audit(1576383837.955:82574): avc: denied { map } for pid=886 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0xc, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 2915.101027][ T27] audit: type=1400 audit(1576383837.955:82575): avc: denied { map } for pid=886 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2915.242936][ T27] audit: type=1400 audit(1576383838.025:82576): avc: denied { map } for pid=886 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) [ 2915.394303][ T27] audit: type=1400 audit(1576383838.054:82577): avc: denied { map } for pid=886 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2915.521313][ T27] audit: type=1400 audit(1576383838.501:82578): avc: denied { map } for pid=1152 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fallocate(r0, 0x4, 0x8, 0x4) inotify_init() r1 = syz_open_procfs(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de154bd8b44717e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x10}, 0x8000000200036158, 0x800007b, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x818f492baf681a2c) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) write$binfmt_aout(r2, &(0x7f00000003c0)={{0x108, 0x4, 0x3f, 0xe2, 0x0, 0x0, 0x206, 0xb18}, "a00c0df310f9ca0d1d155dbf098e736d242da1f0932a3c2c9e88cc2db5a811e488634f2af3ee89c2795e263b7bd38cece2a4d6843895b886b89ddb869d48fb156cc44cb3df2d729b4e91f4cf1eeb1b4f82875d95d46e6abeedd5e5dc1cdcb64d0edc5ad73c6b552147d58f56fa28a208ed790aa5f587a380bc80addc780ad5040a", [[], []]}, 0x2a1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2915.635232][ T27] audit: type=1400 audit(1576383838.511:82579): avc: denied { map } for pid=1152 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:23:59 executing program 4: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0x5, 0x7895, 0x1, 0x101, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) r0 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/dev\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net\b\x00co\x00') openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) [ 2915.782273][ T27] audit: type=1400 audit(1576383838.521:82580): avc: denied { watch } for pid=11720 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:23:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fallocate(r0, 0x4, 0x8, 0x4) inotify_init() r1 = syz_open_procfs(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000000000050000000000"]}, 0x1, 0x0, 0x0, 0x8050}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de154bd8b44717e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x10}, 0x8000000200036158, 0x800007b, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x818f492baf681a2c) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) write$binfmt_aout(r2, &(0x7f00000003c0)={{0x108, 0x4, 0x3f, 0xe2, 0x2fd, 0x0, 0x206, 0xb18}, "a00c0df310f9ca0d1d155dbf098e736d242da1f0932a3c2c9e88cc2db5a811e488634f2af3ee89c2795e263b7bd38cece2a4d6843895b886b89ddb869d48fb156cc44cb3df2d729b4e91f4cf1eeb1b4f82875d95d46e6abeedd5e5dc1cdcb64d0edc5ad73c6b552147d58f56fa28a208ed790aa5f587a380bc80addc780ad5040a", [[], []]}, 0x2a1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:24:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1) 04:24:00 executing program 0: dup(0xffffffffffffffff) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000980)=[{&(0x7f00000003c0)=""/253, 0xfd}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f00000025c0)=[{&(0x7f0000000140)=""/101, 0x65}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) shutdown(r2, 0x0) 04:24:00 executing program 1: getpgrp(0x0) setpriority(0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000d2800"/98], 0x74}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="840000002c00015f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x84}}, 0x0) 04:24:01 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, 0x0, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x72}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40) write$FUSE_BMAP(r0, &(0x7f0000000080)={0x18, 0xa034dff5f9ce683, 0x6, {0x5}}, 0x18) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:24:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') fstat(r0, 0x0) 04:24:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1) [ 2917.951063][ T1797] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2918.014011][ T1797] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 04:24:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x7, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x2]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 04:24:01 executing program 0: 04:24:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1) 04:24:02 executing program 1: 04:24:02 executing program 4: [ 2919.490617][ T27] kauditd_printk_skb: 150 callbacks suppressed [ 2919.490632][ T27] audit: type=1400 audit(1576383842.894:82731): avc: denied { map } for pid=2210 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:03 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x51}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000900)=ANY=[], 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000000c0)={0x22df5517167103ce, 0x2, 0x0, 0x3, 0x4, 0x0, 0x200000}, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(r1, 0x80c, r0) open(0x0, 0x0, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r3, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000740)) 04:24:03 executing program 5: migrate_pages(0x0, 0x3, &(0x7f0000000000)=0x7, &(0x7f00000000c0)=0xffffffffffff0001) [ 2919.737060][ T27] audit: type=1400 audit(1576383842.924:82732): avc: denied { map } for pid=2156 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2919.912980][ T27] audit: type=1400 audit(1576383842.924:82733): avc: denied { map } for pid=2156 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)}, 0x0) [ 2920.104594][ T27] audit: type=1400 audit(1576383842.934:82734): avc: denied { map } for pid=2210 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a00140003004502010703", 0x1d}], 0x1) [ 2920.287946][ T27] audit: type=1400 audit(1576383842.934:82735): avc: denied { map } for pid=2210 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2920.488545][ T27] audit: type=1400 audit(1576383843.082:82736): avc: denied { map } for pid=2284 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:04 executing program 4: [ 2920.639933][ T27] audit: type=1400 audit(1576383843.082:82737): avc: denied { map } for pid=2284 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:04 executing program 3: [ 2920.843493][ T27] audit: type=1400 audit(1576383843.092:82738): avc: denied { map } for pid=2210 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:04 executing program 5: [ 2920.999687][ T27] audit: type=1400 audit(1576383843.122:82739): avc: denied { map } for pid=2210 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a00140003004502010703", 0x1d}], 0x1) [ 2921.191975][ T27] audit: type=1400 audit(1576383843.162:82740): avc: denied { map } for pid=2284 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:04 executing program 1: 04:24:04 executing program 3: 04:24:05 executing program 4: 04:24:05 executing program 0: 04:24:05 executing program 5: 04:24:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a00140003004502010703", 0x1d}], 0x1) 04:24:05 executing program 1: 04:24:05 executing program 3: 04:24:06 executing program 4: 04:24:06 executing program 0: 04:24:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000007700)={0x18, 0x0, {0x5, @dev, 'ip6gre0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f000000d180), 0x255, 0x0) 04:24:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e0001", 0x2b}], 0x1) 04:24:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x104) close(r0) 04:24:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00', {}, 0x0, [], [], [0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$uinput_user_dev(r0, &(0x7f0000001300)={'syz0\x00', {}, 0x0, [], [0x0, 0x3, 0xfffffffd]}, 0x45c) 04:24:07 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) shutdown(r0, 0x0) socket(0x0, 0x0, 0x0) 04:24:07 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000000)={0x57}) 04:24:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e0001", 0x2b}], 0x1) [ 2924.504396][ T2549] input: syz1 as /devices/virtual/input/input27 [ 2924.558543][ T27] kauditd_printk_skb: 167 callbacks suppressed [ 2924.558558][ T27] audit: type=1400 audit(1576383847.912:82908): avc: denied { name_connect } for pid=2544 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 2924.724835][ T27] audit: type=1400 audit(1576383847.932:82909): avc: denied { map } for pid=2538 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:08 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)) [ 2924.901853][ T27] audit: type=1400 audit(1576383847.932:82910): avc: denied { map } for pid=2538 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2925.083890][ T27] audit: type=1400 audit(1576383848.100:82911): avc: denied { map } for pid=2597 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:08 executing program 1: 04:24:08 executing program 5: [ 2925.287005][ T27] audit: type=1400 audit(1576383848.110:82912): avc: denied { map } for pid=2597 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:08 executing program 4: [ 2925.465323][ T27] audit: type=1400 audit(1576383848.130:82913): avc: denied { map } for pid=2604 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00', {}, 0x0, [], [], [0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$uinput_user_dev(r0, &(0x7f0000001300)={'syz0\x00', {}, 0x0, [], [0x0, 0x3, 0xfffffffd]}, 0x45c) [ 2925.628475][ T27] audit: type=1400 audit(1576383848.150:82914): avc: denied { map } for pid=2597 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e0001", 0x2b}], 0x1) [ 2925.752230][ T27] audit: type=1400 audit(1576383848.160:82915): avc: denied { map } for pid=2604 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2925.937940][ T27] audit: type=1400 audit(1576383848.180:82916): avc: denied { map } for pid=2597 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:09 executing program 5: [ 2926.098423][ T27] audit: type=1400 audit(1576383848.199:82917): avc: denied { map } for pid=2604 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:09 executing program 1: 04:24:09 executing program 0: 04:24:09 executing program 4: 04:24:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e000100060003000000", 0x32}], 0x1) [ 2927.182136][ T2987] input: syz1 as /devices/virtual/input/input29 04:24:10 executing program 5: 04:24:10 executing program 0: 04:24:11 executing program 1: 04:24:11 executing program 4: 04:24:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e000100060003000000", 0x32}], 0x1) 04:24:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00', {}, 0x0, [], [], [0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$uinput_user_dev(r0, &(0x7f0000001300)={'syz0\x00', {}, 0x0, [], [0x0, 0x3, 0xfffffffd]}, 0x45c) 04:24:11 executing program 5: 04:24:11 executing program 0: 04:24:12 executing program 1: 04:24:12 executing program 4: 04:24:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e000100060003000000", 0x32}], 0x1) [ 2929.640310][ T27] kauditd_printk_skb: 164 callbacks suppressed [ 2929.640324][ T27] audit: type=1400 audit(1576383852.950:83082): avc: denied { map } for pid=3105 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2929.872687][ T27] audit: type=1400 audit(1576383853.049:83083): avc: denied { watch } for pid=11720 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=1134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:24:13 executing program 0: 04:24:13 executing program 5: [ 2930.052857][ T27] audit: type=1400 audit(1576383853.059:83084): avc: denied { map } for pid=3105 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:13 executing program 1: [ 2930.206200][ T27] audit: type=1400 audit(1576383853.098:83085): avc: denied { map } for pid=3112 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f00000001c0)) [ 2930.367780][ T27] audit: type=1400 audit(1576383853.098:83086): avc: denied { map } for pid=3112 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2930.550531][ T27] audit: type=1400 audit(1576383853.108:83087): avc: denied { map } for pid=3111 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2930.677994][ T27] audit: type=1400 audit(1576383853.108:83088): avc: denied { map } for pid=3111 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:14 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sync_file_range(r1, 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000740)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="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"], 0x20a) clock_gettime(0x0, &(0x7f0000000040)) utimes(&(0x7f0000000000)='./file1\x00', 0x0) fallocate(r3, 0x8, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000180), 0x8) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) [ 2930.834683][ T27] audit: type=1400 audit(1576383853.158:83089): avc: denied { map } for pid=3112 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300000000000000", 0x36}], 0x1) 04:24:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00', {}, 0x0, [], [], [0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$uinput_user_dev(r0, &(0x7f0000001300)={'syz0\x00', {}, 0x0, [], [0x0, 0x3, 0xfffffffd]}, 0x45c) [ 2931.006087][ T27] audit: type=1400 audit(1576383853.158:83090): avc: denied { map } for pid=3112 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x7d, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_triestat\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/121, 0x79}, {0x0}, {0x0}], 0x3, 0x0) [ 2931.161621][ T27] audit: type=1400 audit(1576383853.178:83091): avc: denied { map } for pid=3111 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:14 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:24:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300000000000000", 0x36}], 0x1) 04:24:15 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x1a, 0x2, r1, 0x0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0x6, 0x7, 0x5, 0x84800}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@rand_addr="d01c0dd13c07ae48aa73f73dadb0ea7f", 0x4e20, 0x0, 0x4e21, 0x81, 0x72bf815f0f490bbc, 0x80, 0xa0}, {0x2e48, 0x5, 0x80f, 0x7, 0x6, 0x81, 0x101, 0x4}, {0x1, 0x1, 0xffffffffffffffff}, 0x7, 0x6e6bb2, 0x4, 0x1, 0x2}, {{@in=@multicast1, 0x4d6, 0x6c}, 0x2, @in6=@remote, 0x34ff, 0x4, 0x0, 0xc5, 0x1, 0xfff, 0x401}}, 0xe8) write$binfmt_elf32(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{0x3}], "", [[]]}, 0x158) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 04:24:16 executing program 3: 04:24:16 executing program 0: sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x8}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x89}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000240)='./file0/file0\x00', 0x155) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f00000002c0)) ptrace(0x10, r4) ptrace$pokeuser(0x6, r4, 0x388, 0xfffffffffffffffe) 04:24:16 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r5, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r6, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r6, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, 0x0, 0x0) bind$inet6(r7, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r8, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r8, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) socket$inet6(0xa, 0x2, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r9, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r9, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) 04:24:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e00010006000300000000000000", 0x36}], 0x1) 04:24:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r4, r5, 0x0, 0x1000003) 04:24:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@sys_immutable='sys_immutable'}]}) 04:24:17 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYRESDEC=0x0, @ANYRES32, @ANYBLOB="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"], 0x3}}, 0x0) r3 = socket(0x11, 0x800000003, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}]}, 0x20}}, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002800ffaccd311f49335aa97b3dcf322a", @ANYRES32=r4], 0x2}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x14) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:24:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e000100060003000000000000000000", 0x38}], 0x1) 04:24:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) [ 2934.689513][ T27] kauditd_printk_skb: 167 callbacks suppressed [ 2934.689526][ T27] audit: type=1400 audit(1576383857.968:83259): avc: denied { map } for pid=4037 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2934.846975][ T27] audit: type=1400 audit(1576383858.017:83260): avc: denied { map } for pid=4037 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2935.048235][ T27] audit: type=1400 audit(1576383858.037:83261): avc: denied { map } for pid=4037 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:18 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) [ 2935.190737][ T4114] FAT-fs (loop3): bogus number of reserved sectors [ 2935.238015][ T4114] FAT-fs (loop3): Can't find a valid FAT filesystem [ 2935.268742][ T27] audit: type=1400 audit(1576383858.107:83262): avc: denied { map } for pid=4037 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e000100060003000000000000000000", 0x38}], 0x1) [ 2935.454719][ T27] audit: type=1400 audit(1576383858.126:83263): avc: denied { map } for pid=4037 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2935.621539][ T27] audit: type=1400 audit(1576383858.196:83264): avc: denied { map } for pid=4037 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:19 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000dc0)={@multicast2, @local, 0x0}, &(0x7f0000000e00)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r3) r4 = socket$xdp(0x2c, 0x3, 0x0) r5 = socket(0x100000000011, 0x2, 0x0) bind(r5, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) bind$xdp(r4, &(0x7f0000000900)={0x2c, 0x0, r6}, 0x10) [ 2935.813247][ T27] audit: type=1400 audit(1576383858.206:83265): avc: denied { watch } for pid=11810 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=1134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 sendmmsg(r0, &(0x7f0000008500)=[{{&(0x7f0000000e40)=@can={0x1d, r1}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000ec0)="ed00d13f4f7e9d4b2b67eabb1a6bf4bd1477775539b3a4f2966a9c10171583818cc196c3d29d49b69f05d1d411ebdc7c15eb9d9643e4ec1af77aa652e550d9c8182bf41561cd60ab1287e31420ed35df35b7acb2246c7ee1c2d6b6026b758882acc7a12681bdcce5b994a428dcd3647d91b295e8213f121225e6ed5ebfcfdf89e71b88223d79c60f0fddcec8b8bf5dd7a9fa7d31e4bd18979ef0802484f7d7f2fb3595fd3a21c2cd", 0xa8}, {&(0x7f0000000f80)="4d4ffdd8db1991a49d5f08afd658ca8c5f9dc269e33c10e4460311bb882db9d83e2b97170f92fdc61e6f07cbd3f381782bb87681b8c3340d1c7d00e8a6d354569aee94e7f0d3bca2bd5394c70087ae576797c93a865416e7c8c8be8018791a5545dba1f704fe77e33f185881b1ea3c912507163cc8e7ce1382a51b820940ebb09a947d7e48b001f7c1b31df1dcee667f", 0x90}, {&(0x7f0000001040)="89a2dfdda98bc4c11c755453a4262b6a4f15d1898c2956c8df036d59e23d320bcfc6b72f61", 0x25}, {&(0x7f0000001080)="0fea7f949c4c364398f9229830b0548e8c54c2aabe2e9797b0500fee81f93200a5c451ed49f428386d8cd3aab9f275d8d6f644765434e63d0378581f6f30dbb5c41dd9578a00cac445339a5296ed7a22f599fc7507897be8b863a309457724301d9f7365c82cb30607fb7302ac729e70d512", 0x72}], 0x4, &(0x7f0000001140)=[{0x20, 0x88, 0x8001, "62fd96919ea00f31a0e71feafa3d"}], 0x20}}, {{&(0x7f0000001180)=@pppoe={0x18, 0x0, {0x1, @remote, 'vcan0\x00'}}, 0x80, &(0x7f0000002780)=[{&(0x7f0000001200)="40b6ae190a12276ea03ad41ce8b01e52712c985c967749ea563cd254366480be1c69789fb06affc9767d30ae29715e88d91c57069c755716595cb1aa20021f372fed061da5210dd5fae500676bda4533eac71f9df882b8123d16a2c9dba8f4130b6b5815fda827c9e33e2f859a493564a5541ba5b462bac425bbb95b034d9e442c5a937ecf197314c63cad85c4dd1f1a9d3ef7402e44020185b7c8c01bc0d684e97e288a74211b1c382f04d1939d5a9787f4905af5755347f2fb3c7817aa4707ae2ea19de45ddf654a1538f167b73642438660c387", 0xd5}, {&(0x7f0000001300)="ee17fc25e9ec657fe4ef39acb44c9264586e418238398c88b0ffe3211b8975930a6736e5590bbc0b1002fe36f2d5aca476d46b4009ac47472d0a420eb7cd7b0aaab01f1b20f96ba6802a04d7882e8e587d5402f1c43d3054b29de1a45727ebb88dab8b4c2c295a045c2d73f2f5305c47ea16ff6efdb5ca1fbfde456eb56f5b942910ccc830295b5ead051d65799a79bd", 0x90}, {&(0x7f00000013c0)="e2e13329a6fe48fd7e1c13e5f0b0b251b22ab5cb3ea59105b63931e0027526b37a0f203f7a3392d9d3e2f5a316f4a3e5384a86f9946ef0e21e6c999417d20f44f117e3a0daf2426065bd80f0e1d468909b6306ad45161b90dd90380e4c698b2beccda5379cca59eccf357c0d2f7539963224675dfb9431cf54ecc0691f6499d0ef9bc2c25cc45a436d93f24f0abc77dd725deefeaa620889e3ece0cfa82d5dfd23607c005607850a88b2da8d0f477f1ae2643ac9e6ba93d26fc2bdd4777eac5d92ba91ce7e116426910c15dd021ccda87e65b5503eb7af347343f8371d5974ca75476aa41b7244d04ac6bd8da00e8dc0a2076d8a0ad56df74f", 0xf9}, {&(0x7f00000014c0)="fbcffe2db4784e7ccc8a4661b3dcc385d0f9e30a304762f2451077e7aee81cdd5b6ee0607b23883ea55bfd98a12c91473a5f26d0d37d2f586e6839b07ff4efca9efcf40b51138fbae45c8e8edba025abd12d75d8209a0bf7ac464b585d0ee449d42003ed2be4986b539932c1443f4bfd330823e72f3a6bea63f65ed7bce8a890d46b22be5b0f4481fa398c72fe99eec1eed72c59ecb07146abdaede5b78eaf0e8839c1497110b885859ef2627e593f28c1a36ad615cea884af85a823eee59140d8248071819a9b7d0d6d1a57596b554dc38f7ad2477e2011b26d4b11da", 0xdd}, {&(0x7f00000015c0)="35715e4fe1b7f23d013e9ad150fcb88b42858f5a24810475b41e707bc31f726204747acdca4e4eb5b815187caf1cfce788acee1a4eaee4f5fcf78f1deae16b1b0224fcd4ce6e77b6a4e3f21c3ed6d3d46a07f92d8ca47d8d9bd3ceef8dd189d931515e95cd88484f174dada765ef4f83f4aec8bc3b7b6fee68e9", 0x7a}, {&(0x7f0000001640)="751ae2bc872758", 0x7}, {&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000002680)="f0e760917924822ebc2e14f61ba2cbc00257dbb728d3ba8c70e24e12e1ff1704e2af243f35f2095bb4dc4b63", 0x2c}, {&(0x7f00000026c0)="39f02fb95a09dc7384fdd92d04974e9a3126801d6d5910130fe572210e1eaf79489e8bc96187fbaa3d4323c59a9f5eb079815c5213ee4c6640e0fb1bfdd02e5868bdafb90a346711d88cc2d272be14b74999a664660e180655ca8d37115b3e2e73e889160deb25db52310487a7529725bd45f5a94e51d2cc8cfd3712a246b951941d0cbaec12aa25568a41022e107b205eb4fd52bc1d1778816f94d765533a9811ac980cfcd3726af01471d48167f8cd3589dd19582ff1dcbc75a79e0c0955af", 0xc0}], 0x9, &(0x7f0000002840)=[{0x48, 0xf, 0x8, "b5d6a42d7454741e3f241b9ddff060529cf2b852f5c1a0ff3172e732f56f5431a77b476b6bdd2d8113971b68a8b44467743bae"}, {0xc8, 0x109, 0x9, "9197224ad794ca25163405c5120a8d77431c21b0f250f94deceaeeb987e15cc55e5666d8bbf4fa97101c96d14cb8a1a0eddf7bbc0ad2ddd33a13060920129a715f091e0f6dd619cd66e1ba87583c23fc3e113f43e71a2797086d462c59e5e1556cbd3f60ff851969da4284061bd158787e03334175a7bab46ffdf3e33c4e4929693ab19edb000c3faa4a9f5493fb06cc2aafbdb02a88665bf5a47338bf3fa3a389598d9a4fdd0259613159f2151705b1677afd3a10b194c0"}, {0x20, 0x10d, 0x7, "0615c8cb5e4ba41a30548e2641"}], 0x130}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000002980)="73d20de90159a2c76366ab3d9da6d6459cd33586ef81", 0x16}, {&(0x7f00000029c0)="5127ae850c052a961b6466228c3528ed84aa11a9848a3855f83c22d32cc62566df689d1be12c79306129dd3a617f5f4423c5d96f0c091184ca1ecf1ba71dce7dfcfe911f58beb3731ccd529d", 0x4c}, {&(0x7f0000002a40)="5e9aa0b7f1c22be14a08d0dc96c7e35584768b3299f94ec9c7e0f641ebdf93b4", 0x20}], 0x3, &(0x7f0000002ac0)=[{0x78, 0x2c509660a4cd4925, 0x101, "0390cfb55bcb29610d14141885a8cbb571b729f88490938896071aafddefff3a1f7781d1f76057e534745082d7622605b91b837349631591967f614a6e0070d09ae2d1fd4117b15dc92734b4635d79bc6a9cd725bff3e45f02668c4d09f177c1d0ad23342b12d0b4"}], 0x78}}, {{&(0x7f0000002b40)=@isdn={0x22, 0x5, 0x0, 0x80, 0x1}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002bc0)="493fe2426f469f7603f219a6b34af4e40fea1f82c60d40229733d334f7da5a4ba4fd6e059402c4c4af0228319ca337d1d0b8d1a6a5b59efb79869bfc2314252b0cffc264798bbfcf4c190400736c53", 0x4f}, {&(0x7f0000002c40)="061fdefafbd3b1249388064ee41e65fdd9df547169d4ab5b8c7d3d072354e4d0e293edf62a46b1f19d41d4168eb9202a105aa2602299d1db99aa2e62e7368d17bf23f81d31aaead2616c555e97a5b48f63715bd11a21b8fe0199ac7e81a0e0653771b29b560a092f9e4a02f82cc3b6317e3c299feca877c8e65126079f115d419ccac6a46ab8ba7e2fd235e89f0b66359b9e1472648031463fc0eb39e8d4d20612dcf48752114f386c5d89616c5e7cbe33d12e868df8a3302c1dd03ff9d2e9991de59bd178f968180a1e581bc4f21e209bb34387", 0xd4}, {&(0x7f0000002d40)="b6bdc70696e860616dc8cd51391df4183e2969b20a82e3e9e72ba3b38fb6f79d41e901a861b1cc02529b9699007b40147265562822f260c7f06b2183441c8709d911183218f769a99d53d11b7744969ad0c16be5da2205815d0143bdca308bc61036c107ad869bc232afda79717bc9b69f5895a9bf813ff4418adcf14bbbbe230a31fb0d0c5059", 0x87}, {&(0x7f0000002e00)="6b423767e2040e837725de187aeea92c1767f387359dbd8c71bc996964821786f274d3b74060c431eae1f6bcfbdc87a2a9dedbbdef618634a1895ee0239bfabd31a52e21427030815e386c0ae03529ec4751440a2973763e26790dd4b5c2914fc95090d1fcf91301c700a23d3be99af6e70ccf85db57e2d574ba2f4184e5027f9e1ad0d523ecfe788e7529ca13733122a6d5c234c2666ffc602653d7158e53bbbd8d39fa27e5186e9fa2ecb0fb0be4940bdc39767e322d1919a01d06014be673322fc467b4bbdc0e08f38d649c6717a3e8d4e03bf499c3015e", 0xd9}], 0x4, &(0x7f0000002f40)=[{0x28, 0x101, 0x1, "620d59d52cd9929a859629663841c8e3ba"}, {0x80, 0x84, 0x6, "d6ec1f6de2b693374af22bb557aa752eddab0c123d908bc07e4832fd4bd13d190d913a38273bff61884b52898f92712853966d891bfa6e5f4cc82c49129cab9bc70f85a8c2c2f28900210495b2ff6c1902c04fda4171c92dddb90deb456c9b9fe3a74f135911c0401f"}, {0xb0, 0x0, 0xff, "b39b7c8664bd8b7788405a87b40a5c5a3aa7b980a193117f51066a2bbf63c75dfe9c1a850e162e28d383fbd3cd85c293b153d3c125ea431b319d5812363edf9cbe999529c92fdd5532df973c4c7135650f2421e79ab7ba48bfef6b79a4159edbedc5092fe5f421f1d55332c22cb369900195dae9f7b835af5363ebfa63b5ba87f9dbe4361b2f29e179553a4911c9eef45d4939801de4adf2742847f3cfc650"}, {0xb0, 0x100, 0x0, "4db35b4c15fae43d1d01495dfc070f0fe714bc3f6deb9ace6023297490171fce08218a9d789ce683cea8b2f3be0096507ad52a8c6bae516aa253e8c4e8ee0bf634fc95728302936bdcedd1e6837dd9880a53a26d33424c207d990df6c9461e8a9b90221f3043984967eac68e293e693c7ed6a277b247c232c1c136eb8af8d0d23d33c607cd5f5a385246f939fa4693964973e5238a757a15172ab15ad936e01c"}], 0x208}}, {{&(0x7f0000003180)=@tipc=@nameseq={0x1e, 0x1, 0xe83f6c30dc60c4dc, {0x41, 0x3, 0x2}}, 0x80, &(0x7f0000003740)=[{&(0x7f0000003200)="f72bd6da8ddd3b3bc32f23530740a68fe995a684f12fd7397b5a9a06443feb90150675b3699f57ac835363b1e6fff5a830acb24ca915a72f0455fcc2d01965ef1d56411fae670d737036885cb4dec2ecf79206000000db6ae55dff7f47930b06", 0x60}, {&(0x7f0000003280)="d324db9644dec9409214a1161d1ceb064f8905f0b05f462b08f2c206d17fa0ba485a5d7ce0e4738567373ef380ced28b9094cda40328d1480cc92c129ae6149686d9baa999937c55160f4bd3ad2dcebaf8531df129acb9172a5f6dd230d50e90b407120c02320019", 0x68}, {&(0x7f0000003300)="bd829f61a6b107aa4cac58ba791aec632230b4b39cf4b2b35ddd0a1682a7d694b7542e98489c4d88a38b1176760d61db1ea276c8349635d896d6d7ad46ce763d050ae6054204e48bd8af0f90b4e5e6b89379500e80ea9f23cd2f4bb19879a26004182d89a8204d9b7ff6e9cfc59816f619178fcb636c95680412a8a96a9b9d407ae8f2d2ecb3424734489d9799c69c8fdd6ef4fd1828beaa0cd42ac70c71592dc385b9b58291b49d31d18df0922e8672ea4f9d3ad0b442fd2d37a42e0c7b4a4d96597bfb315f6a9c0460dfe1e5200884f14ecde3cc6fceb2ceed6024d8", 0xdd}, {&(0x7f0000003400)="41cfda530030553addd20d239475e5176c5e4ba56aa17b21c6a41c6ab9ae7bda42fcbc40bde21eaa66f5c71bef255de6da52f42364391ce3971e92db3753a3f7b6c49de8f6e914304d6bd3d35da0327124da735fdce0e5b47269193bb5df4ae0b2c0192810f6c9f699cdc261a617a0b471cb11b3659c3d37d2d2e909d7477b2f2c799ddb84faffb74e7e8a25e77996790938a33e60a7837e2641639ad7660e00eb40b81581ebfc0114f2f6b0c2a9048d", 0xb0}, {&(0x7f00000034c0)="c88da309f783f877c0eaa006421ec6049b820957", 0x14}, {&(0x7f0000003500)="2ec4cdaedcdc3183fefbadeb31144ab525f0a179237c1b1bfc50867ac9e92d328da0f05f30281083510e4ca3407f786e453cec73679c8ff8aec0f12319b6e2324417f60c3fbc32db224227240cec7ebc9c4eb5a816fb34894a51f4f4a66cd125ea4872ab7081abc19c7789183f9b8b4a684c8226635067a82580b3f807c0e7bfefdae8017fb6929c", 0x88}, {&(0x7f00000035c0)="d0a3becae1e729ea6cec061e51a82d5730fed7de1e233165154c1c1087cfaadd1808d6f9cccddbc858f55e37112db7646c478ae32a8c6324c4ab9d5fe02d3acf37ae5d9458950ccdbd0d4ecd37d1ecdaad2f260938b8daa839412ca26209ecacb6c393d8eba03d7f38e709978777", 0x6e}, {&(0x7f0000003640)="2fe2a792892ca5d1589abc6fd58485222d24c52f39c73e6f0fe0f45f0da61bfb87b00b3385ea88b86f3d93aae760bd1be3cdfcd6dbf83b8e9fab1103553dc28fea75c81505de038803440a84f6c6e8afcd268a0cf9508950390342eb90a4d4dbc23ebd0bac2f7d3c1b014bd2c31b0536f2", 0x71}, {&(0x7f00000036c0)="54f6c4bdf907db27bdced6f3b544fb6a2c4d6c8baa549f348bf2f081abd6ad48e4c83203b1c0856cf0d964c30a8191d8047b9ecf8458656af713ced351c57bfb89dcdfe0ef8f19cdc88d8cfcc36ecbc1e7bd00263ecfb12b3491f18150dea87606c4b6c7bb6162fdc92423e468fcc9682cf2adff2f32", 0x76}], 0x9}}, {{&(0x7f0000003800)=@nl=@unspec, 0x80, &(0x7f0000004980)=[{&(0x7f0000003880)="736ebaf219f4edbb8b19e376ad5d609a4c46541fed59d5a93bdcf30aa801b4909c60", 0x22}, {&(0x7f00000038c0)="85", 0x1}, {&(0x7f0000003900)="5a7f85da7ca34f542140d4e91919989e6d4e9f79adf26ecd5c5197b85b7d4cc0684bb91df7c0f2869ea2401b411c25cbe2e0cb866e6d40d6f07e0acb210b0e1f78d04045b1aeb9d1c6ff", 0x4a}, {&(0x7f0000003980)="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", 0x1000}], 0x4}}, {{&(0x7f00000049c0)=@nl=@kern={0x10, 0x0, 0x0, 0x400140}, 0x80, &(0x7f0000005b80)=[{&(0x7f0000004a40)="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", 0x1000}, {&(0x7f0000005a40)="befaa47e94531aa753264f6258c11a397e8c9c836b211aff713307769bc70092138cdef1df15213060", 0x29}, {&(0x7f0000005a80)}, {&(0x7f0000005ac0)="932ade845360d0a7c5c3a4be92d14a985840e1870797921e7377d8709329cb6d3f5542733041a5f452bcdf2f47893f78a115a9d3a8a12ef83a4cdb78d117be50823c3e77185059e3c3eb870504531014aa1ff94bb970031dd65a197f483eb2781fa59f53fafa0b483498b7ac41441f14b863a9e69efdaa235617a3055af6e6bf76f9a26e33ce339b1680533691c3be96f1029c842ff4", 0x96}], 0x4}}, {{&(0x7f0000005bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x1, 0x4, {0xa, 0x4e22, 0xbd9b, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000005c40)="13e7a2f96b5afd73180476622afe594ccd31f80fb9dc98348a921fa415ccffa9834caef1a565dd85d153fbe24cd7db1451b229c31fecc72b536c4a22052332445135cad789c3c57291c9d6b2c6ee6651227308f2f2a4b936e76ab278d29692bdf3385cef23c7d7ccc0ea3eb812b8dc630e34cad6df3957d2688be9ca96d59ccc0851082270bebf996453fcec5e5f4da9b60a49f6d0ec0ea38a7008f60db3bb518c926aa2569e8b49be4d30789ce3e3422e5c", 0xb2}, {&(0x7f0000005d00)="33f6c857a7257798663216bc66fcbcdb3046b8b77ef7392c31ec930243c80270ee499af80a17d74c631046e15a9af1db5621c541e3efba01579dfe1c535cc2c378ebb277efcb073dd2308c6634823e115e283b74e666b5a9f1ab5d88fa3643ae9e22423de6888dcd8e8a0503047dd8275be89b0aa750c83548d34e23e86a08db595bd14ed52a5eaa94f541b45425673cd157a127164176369b39746e10306f561e17df19e4f025151eb0818ba1ffa4755dc6d335599ebaee6d5d924f06c43ae002ddf9fd21a464b80e0b72f739134e294009fe982c2fa75d671f35244832902a0750dd0ddc2b", 0xe6}, {&(0x7f0000005e00)="2bbae90c4dbd27129103f54750373d96f333f2a13c3d4bf8cd83840b29a949b4a233c56b9b0984368dd98b422e2b7ceb7647c1dc6048764c33638f129776816be465b2a8e21bfd6afa91cf90c1c418918324ff45038190d900451b5886f515f83e5c7416f6cbf592ac86c8f84202980190c77d68d0066e06780162fa4c419a62d4faae330ea8847c", 0x88}, {&(0x7f0000005ec0)="c98b81da9b2953f0ba528536792d7efa2f70afc50b8e79b5", 0x18}, {&(0x7f0000005f00)="42d667c86bc41dea6b2b2fd76cc90ff5374a394b99d112f147f94d4c5b11099bca539130e390471a236f6b7eb283b0b9800e92516555fdb386ed17e1defef8699fbe88af4df803f03c93235c2421fc333bf16b5d6be24f35ca8fac716bef20bc53ef7ae2a7e38ff25be7da4d2df1fe3f62e049796ea7bf22ced054e76b4e90600523c48d6ec2c33b612618b06890417a43db09f664740dc50018b77e99cafed10635e598b68cfff6", 0xa8}], 0x5}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @loopback}, 0x3, 0x2, 0x4, 0x2}}, 0x80, &(0x7f0000007200)=[{&(0x7f00000060c0)="e3d7d1e90feb017bbd2edd87e6a0913e2ba3ada9b461896ac7992845093b224142efa16c6f9421155999ead309e9dd41f1c136e14cc1708014940c0c0d7fbc09dae448429b97ac46c3e1f8e0940d51be043ba5fe7b2dc54cb7d298212949fd2adee193ee1363d2e242714e3ef2834144783d4008ef0a6e571e92ce83ff0cdb68a0e90211ef5c2c69be9b81db1fad9c4a57cd3a6ee5a056439358cfda9ba771fbb0002a272a3ea6adcb64b50666a91bc0f955f30c245d38b2488c366b30790da271132bcaf0cd09acb7cb0b683b41e876ed66bc35285b268b43859297bc9f40a6118033c7be9e3cc5effe3f448da88e06d4a2d64cafac5b850f73ff2f9f495bc572a251fcc4cd3b32dbbdfdcefda2204445fa1fa86f3eb2b44b1ddb67986a584fadaf1782983d310820453a592ac1919001c90ebc2b91e316fe1746b49cd7686e29c480c0a4eedae273656e58e31e0e2fd3f3bcaf5c2aebd950bb11c46cf682ec4abce8970aad57bcf4134dca0f7a94a6a46d7df53de9dc72cb4b42c927b7a120bd7da3f6dc38e8a42efa32c7b9c740e30b2d573026e2647005159f81324797b764e4db2330c4f4408b256c580271616a4e6ba5bc0b2a4d762eb7aef4ecb1ad8a8f7dad38429431340d5878c636f9a8e26010a63fe0df7e542356b75a6fd95ee783dbd45e37225fad277b44ae5d5cfad44e0edb2dd6e356590f7108ebe77861b43b9ec3fa664415687e83a3fccb9c06036fee5b3e88537e1524300e2e85e1ed21a59b754803237e837e01051cf2a6d6e0827d1417ff6016425f5f53cf01a1038cfccda00ea8d1d1616bbfde1247f3127b0f9c609e987d9b3aca47be662eb9dbf107a4ddcc9a5ea5a8082d42f864fd35ae8ff7669cf894171f551d59560631bcd69646daed895fff360cb61f4cb205f893e1f45eefb74db8fc383b06404776d01bc8536ff3c8d3282851fdf5338f83069cf209e35651f510ab12234796a2009c404ce25ab820de0c8fe87df6a1782ef626c8cf859c42b1eb50c6dcdb78d3116149cc6221959b0d483df0a431d6080b24b6b5be49baff8e66f305f755df55cf57aad47835066c7c9121bdc5786f9503385a0a2eabe7589ff75df5b4efd476d83f78179ab94c0b91ff36e130984a706e58db8861d09da42aafc1081098c1bb334de760b545d3b53c2506409fa3e17890a7d82ed31a50bb0356e0d46bef7e5ca2b8851d6198246bd4af77f7c815bc094ffe20eb264d4c0a4c12f1c6e394da63bd4de35da77afeda299c38659076841897c2bd9fa402067e6c76fd4e526abc241a74225762b403de922f2c61a793ea5e55a6a40e8403cb1db4ac78e363c2612a116f5058dba1ed04a9b205bf60ed561036a740aec9d898a2fc51d8db2b461e591a4eb3a36bc561d52a551a4af9a3954013f56d7624934878007d4d528f26631ea0c2899b90e1797ef3cff118724f5851b73aa6167a354130b9f3c0d96cba6521438dc8d7b766ee7b89d305b66d7b25cd1ebb9f89bdd9992c8ae6228c988a0724ce55dbb65cc008c004d7d63d4dbff51db5089bf63ce31cb70b963577498b8b59d945e376f1ce8195d06cd5647867bb1b62a62874799f2178eae9d4a706f79b9df670a3bc616f507089cf91f2cbff8781399dcf6072be7a5ff06bfc97b86078251c24be8b40b2aad74fcee1bd2c64b1b0379684beb7004d807accfa73200ec2a33a46ad49eb519d2ac35db5a6255c265e60c0ff48bf7799811cc9082219b7f488cc0d3d8689b661f7a1335d8efb77f92352ad30a7025b7daf8e278e56503aea0c102fbdc1e6175b1ba128cf4b48c3b5e7253cb5937ee7336f8f9ee2156008f259eef886897033551f3c49db3ecf0e3393176956985d54a99f67d99ae291e64e372f678702aa5375a674c7d7c7bd6f921349840b99ff17bf9726f7dcce932c14c57560dc142c424f98492d53faf0b8218e92344f1122d926208c2e628a544cde945adbbdc22dc6abb37720ca0440516709f5d1f8058dff137b1f4bd8a28b8cbbbbce20fe84a64574b784f6ac9c3b9ad808cdf45292a5916dae2e30a24cadabc05469bcb3e557dc6b2130f1c4c289dd1711a15b32d396385ce93cb423983b00bfe3ab431ea6c3bd51c31e542e99999dd08c4a8aade1898f35ce6d9f81aff8b79c14977404925c05390fdeba8935ea3a9940b2b53e42c4b1340fc81a0c320da9eec756759590346becdc21945e4203b61928002fa7506108d5527114240685ed674de1cb0dc25ebf2ad3f5822393862726622c9ddeab95f2cc7524c21966ee218d33d5d2209c7b7995b266180f4f1eeb7eccff1b7656496d72088b0907c0b556d9641c5a0c07771055aff392e4cf05791afd4ff9647b9bc6f235999aac638f4876355fd18755c596bf1752f688256180a970c36a173a67c2fd804dba6ef527c6f3b24db06b446027263d1b03951ab468c623fb91302d847954550b0499cab9247a0d8145179343e7a8e5b9cea7ee98c381f8817aa490653e1c422f1bebe7f911c2ecb00815ee943466859c4f5dad14a968d3aa1b32bc92aa85b3dcd92eaa44acded38660fe2a9361dcf76c7dc0318f34084e8756be5508ceed08a52ab777f9f73ee6363eb63007c2007785cea21f7d7e11b9fa11720f1ddc6eb8fb83d874ce70343792e95ec4c2f00e6d9df30d622aa308b36f8b669e83aee82451482d705810456cc585a5e6899f8daf526748d6cee8e9f0ce73f3695b21b0bc898d7476b654b14964d6fb0fcf116d66fc70626ad2225bbfba6a6a876c852de60e2fc41b5275461fd0a07f437cb75b46aea1b55fad485586e79dc28d1e8647b36b7d8de96792fc21ffb9535df3302ccc75d609d91c212d70df794aa5925662c7309170327a537e50197fff4ad6daf5a139dbb72681d11a90e0039bbb7f01e395b53e9b0b59d4fed18f5d018a98feccb5a5a09bb7875bbd7f2eb9349462ef4b18ac8f16fb314e18b491a5fc81125a910c5cd4c35015ca838870e3203fbf3c906e17067d9bd71992a92effa4cf1557ec4d7385b9c3af67b0e7ecd02b2376f600d787a9261b0b186b5f28051c9a0a708b0ab9af8b30267139459b6cd506ef5ff1fec3766dcdc43635cbbbdb35512986f5a53fad21fa9ddcb7dde7438291029b86912916d7508b60553192da06e600023894fe1e7ee207d042453a46f7c9b0efc0e74fb5626ab587ad72e0f3a4399e73363b45504d9363818f4c1b6334ef24e565c6662239982193578c4266cf103b516eb4beb8b6d1b324c342bb30b9670dd35a435ca7d0deed758467404c48fbe2a53ffe984b59507320f8f963bf8a8603ed53d7ba3f6b55db02693fc4464c777c0bd504e7537eaebeb347992f353662bf2f9dc02748bbbc62d7b6339186d1b47326c12dbd74b491453fed3dc561bb36799b0bc826a12ffd6f8d3b3747ebfbbe8452ee6d5548dbb5501466f3b5e75a2568f77830347027852765576f84519ddcc9efd777cd6696eb4cd6f02fdc2eeb522d973ef0291721ef6bd11349c64507448210082385377802f39413c5bdf8798a94e92689dd2c8ed6f24c3c07cbe02d81683e9e124e988c31539e787be5d45d005b4e30bfc8bac603e714cbf42216720400914c6237c88c0cbb7d5212f7acee3b9569387de382d40847f94494e33a73361e681908e412077e2743fb6b0402d966822a59ab7b2634c1e27041f7b2b61d7eb62fb9c9adc3188776097348b90febdecdded305955785f9013d0461182f800d3cb5d1d69cde6f3c8e7c6797362c4150b656bb776c59800d6643107c9ac6eb54344550b068c258b7592d0d69f07b805daecf6b9afd6b430d0468c9f899b1686d80fa03d505f8c13c4fabeec852a4915d195a5eee7d4a026d05df7f1e2f81fe00aa19e4b275e3dbd1571cb9001af2687d3b82e890cdab52841b5ff33ccbd99383fa1ff3e039685cb5472c92d874a0e61ce15a3d6288bb655067886934571a25868650f46f6deab564e09ff1b237a5a8759f862375780f18186c10aee5ecfd92ee3dcdfd369b6165dbd9893e7edbda042425df4f69be467dbc06d4b5dc5fa93c78dab8659efbc8b9974372bc5c5be7a641641bf51febe75c3a1ace95b5af881f26303c9291be4c28391dc580c091d1968de097f82e7e6dbd5db112e4a8e37e2824f6f55554c3c6a9f32d5e3d733c254cef41881d0befd31734b9c26cd1b03df2fc6983d452ee7b1902c04b01f82dcf14289d1dbb2a1dc0b4231405de804e24580483db871c6332dc47acf21c447feab7789bb5e10a53a5e04a5e925400eb15b1edd02af03dd8a961a3988152a82325fffc7a7350285061ee841b9f9b162a127db00cb8d20ac91fa7b22757b84663436d531ec4401e878ed92036f3e8b8f83fea2a86a8aaa8acf0110cad80d66bde668727d76457db622a38582816910a5f095c6c63c3f19e024a77d05b7e509ab0bda997c60a782e59c1cca1ac0e67df73ceeca7d3b07d2de878f317b76de08c629dc3b58f68b9761492557032615a63fa0508b5f6faa0dd4085ebe4a0ac7ee9abbde5ab4e4fa1d07af7878c646f56ef2a59a4021efa51cbcf085a8e3d2d0a25e09b1bc0da3c8969a973741b3fc5ac1a27addd50de6ff457098dfc43a07c9d15ad8f750f5b3f52f375e33f428abd6eb70b6b3fecbeec6649ccac5c3a776bfc457c6c735fbd3bc5eda81cb6650b627aeb5a8c937ff67e495520129e3d2f0a67eebabb6f960a6ba64f55cb8cac91a776e7c76144176d0277b601625f313deff403ab61bd26ad6e397854ff752c6ba0bca14471e98247cb449144bfe07f84baee06aa45263dc7a1267a59689bdf59c5b2a8b5d6432fe7bb79e6180e26ac409ec19e841b438c2ef726f63c019160286553cc8af58b01838d9f55d8796e2ef971e0363eff2a2d9545645e24bd42f1b95588de92e735bf63b3ee9c99348fcaff20cbb1d7d19b081e141a3db22b43755cd3e3baad00c24cfc6dcd47b6d2ac92e0c0853eecbe3bbde8d79d72c4c6eaae5684258094d5b36b05b09316b91fd76da1c731abdd575a8075dbf8561de4e116fce43dac826e68dce2918db368c21e77b00d5aa7bb6eb4309cb1a96716d535b2430e8ab51313c0f372928709823112399fadebf5d27fdae0cd4f0ccb5be2acbec391efe0185c4f8d509dab1121b5a20eaebe49e0c7446d63f598f495f23244fb1f20d1181828f532f699abef99011ac237110c15eb232961f428da0174f22f5ca02956bade6f46c934d9a0d3e74d0d3ee1ffd13133121c6365db69017f10d197458b7b3f3f9a6b8ef186e366a89c8e9e700af0399b3b7ffccadce1485e65d53bd966003f7fc3786fb99c4103b6a643fbe33c60455771b652b4b6e3e2da0b42dff43a238044f47431b888b4ddf8b0ab8a5ad46ed03e798002bba6810e0d41ac3bddf7b75c04815a797bc6a7c75e77731e44070a1e489e2f43196bfb3727dcdd5e3c5d27825598bf939f9109b2f41218d62fe024374588231c32c486fdedc2749df60e65f761116c98cc3399d977b81c242abfd76b4c8cbb0cc8158b542ed71bae7028aaa36c5bc364e23eee15a7906f7406860e8cd488bf009e9ce901ba25adab69adf9d477303a97646bdfdb63d4236d4b942c011b9b95f4376e51f4d35c7a79df9ea116a31c94632faa6cadc1609056513392268565d8332f17003dce447be76323b3a50fde6b67b843c2fa56841216da9a05855bc34fa767e0927e0447076c603609ea3ae37339df530bbb5b493a3c50d470627f6f2109761de6d89b3ba265e0e3b200b87339", 0x1000}, {&(0x7f00000070c0)="431b429d0bac5ca9a98f2da089788e960459f3a2edd0f227c1b71e0bea2cb0e7b3b10ad46ebd1ec19c13419056a76a3d03ce79dec06e5a5461b80df9f428cdc6da401dc430156427b9424ebb92e174c589b6be59cf1808676c59dab5689e9d56c9f3164c4ecbbbcbd06512218b60168ba504eadd43b282903c21a0947c319225a66b33cc5e4d5955a3cc53511008e671363bbd1093e7ff3b75455e6a28e692e38072aa756a2837287e68", 0xaa}, {&(0x7f0000007180)="8afc233f5fe0055caf76234cab4f7b98ceccdb079a3ee807b3f96f399fc839405f8f924437ec86e1b23f3155e3f4a18c848007b379cb1285e96c32683cfc5747d81449558bcc2de07fc8cc14b0fdebfd138f5a838f7529d91370d11c4e3c376f03c197f2a28018d9e4125ce82953a6104314d099ba00379dd00c526d1929d55d", 0x80}], 0x3}}, {{&(0x7f0000007240)=@xdp={0x2c, 0x1, r6, 0x19}, 0x80, &(0x7f0000007480)=[{&(0x7f00000072c0)="4a9c39b2dbbc66ddc42cc7c7b2ff2e08b9535c4b362d1f3a2af329d8712ab7a0d7edbf489fb7a51e247a4d860216fbd3717a2d81a87de72ee76de2f5a885779622a472b51e38266f8bcb0b0fd1028f6f07c1d3290836afdfcfd422941a8ed99652805c7bc42b1d0f638929ec4799ec04", 0x70}, {&(0x7f0000007340)="19900d87ad8d61e5957e8f92f6bf9179393dfc4d67307050a9fc7c53f9e6d4f42155f9d5fe739dd8fe7608bf000ea3ea444d2d5ae2594ade295fd16c3ce05a227a35b818ec0dcc8e67e36c3213585fd5ff7cd15f429b7b274ec49f0544dcad8005e71e9507d096eb6030d5cff3bbcc5eaa9a90796cad0ff9332ae0d073e63e93cfd3c97c4ef1b8da0d6167c6d9a7c57fb2cb15d923de30c8b01fa9f20eba77cbcc3e04e42b47be3cab199883a5a1457f391aeabc50270475d368c096bb3016856ff8", 0xc2}, {&(0x7f0000007440)="180b5ecd7504a42c2218e047fd48", 0xe}], 0x3, &(0x7f00000074c0)=[{0x10, 0x10f, 0x2}, {0x1010, 0x10a, 0x3, "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"}], 0x1020}}], 0xa, 0x20000000) listen(r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) getsockname$llc(r0, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000280)=0x10) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r7 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write$FUSE_DIRENT(r8, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r8, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 04:24:19 executing program 3: r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000000040)="240000003a00d17da53a7436fef7001d0a0b49ffed000009000028000800030001000000", 0x24) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000200)}}], 0x1, 0x0, 0x0) [ 2936.015469][ T27] audit: type=1400 audit(1576383858.206:83266): avc: denied { map } for pid=4037 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCL_GETSHIFTSTATE(r0, 0x541c, 0x0) [ 2936.191024][ T27] audit: type=1400 audit(1576383858.414:83267): avc: denied { watch } for pid=11812 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:24:19 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) [ 2936.377759][ T27] audit: type=1400 audit(1576383858.503:83268): avc: denied { create } for pid=4167 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:24:19 executing program 4: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xffffffffffffff9e) r1 = gettid() setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffeb6) timer_create(0x0, &(0x7f0000044000)={0x0, 0x10000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x670) getpeername(0xffffffffffffffff, 0x0, 0x0) fdatasync(0xffffffffffffffff) tkill(r1, 0x1000000000016) 04:24:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000096368fe07072b03003700000a0014000300450201070300002519001a00120002000e000100060003000000000000000000", 0x38}], 0x1) 04:24:20 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) 04:24:20 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, 0x0) 04:24:20 executing program 5: 04:24:21 executing program 2: 04:24:21 executing program 4: 04:24:21 executing program 5: 04:24:22 executing program 0: 04:24:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSIGACCEPT(r0, 0x4b63, 0x4) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:24:22 executing program 4: 04:24:22 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) 04:24:22 executing program 5: 04:24:23 executing program 0: [ 2939.764619][ T27] kauditd_printk_skb: 162 callbacks suppressed [ 2939.764634][ T27] audit: type=1400 audit(1576383862.996:83431): avc: denied { map } for pid=5158 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:23 executing program 3: [ 2939.926753][ T27] audit: type=1400 audit(1576383863.035:83432): avc: denied { map } for pid=5158 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:23 executing program 2: [ 2940.090485][ T27] audit: type=1400 audit(1576383863.075:83433): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2940.247921][ T27] audit: type=1400 audit(1576383863.085:83434): avc: denied { map } for pid=5158 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:23 executing program 4: [ 2940.460619][ T27] audit: type=1400 audit(1576383863.154:83435): avc: denied { map } for pid=5158 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2940.635332][ T27] audit: type=1400 audit(1576383863.333:83436): avc: denied { map } for pid=5194 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:24 executing program 0: [ 2940.814222][ T27] audit: type=1400 audit(1576383863.402:83437): avc: denied { map } for pid=5194 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:24 executing program 5: 04:24:24 executing program 3: [ 2940.997082][ T27] audit: type=1400 audit(1576383863.402:83438): avc: denied { map } for pid=5194 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2941.176488][ T27] audit: type=1400 audit(1576383863.402:83439): avc: denied { map } for pid=5194 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:24 executing program 2: [ 2941.383819][ T27] audit: type=1400 audit(1576383863.472:83440): avc: denied { map } for pid=5194 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:24 executing program 1: write$selinux_access(0xffffffffffffffff, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) 04:24:24 executing program 4: 04:24:25 executing program 5: 04:24:25 executing program 0: 04:24:25 executing program 3: 04:24:25 executing program 2: 04:24:25 executing program 1: write$selinux_access(0xffffffffffffffff, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) 04:24:25 executing program 4: 04:24:26 executing program 5: 04:24:26 executing program 0: 04:24:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1600bd7a, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r3, 0x3b71, &(0x7f0000000080)={0x20, 0x1, 0xffff, 0x0, 0x6}) syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x2, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:24:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x06', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, 0x0) 04:24:26 executing program 1: write$selinux_access(0xffffffffffffffff, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) 04:24:26 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x190d0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0xee00) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 04:24:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0) [ 2944.404620][ T5336] 9pnet_virtio: no channels available for device 127.0.0.1 [ 2944.517936][ T5358] 9pnet_virtio: no channels available for device 127.0.0.1 04:24:27 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) 04:24:27 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone3(&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/150, 0x96, &(0x7f0000000300)=""/196, &(0x7f0000000400)=[0x0, 0xffffffffffffffff, 0x0], 0x3}, 0x50) 04:24:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x200, 0x0, &(0x7f00000000c0)="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"}) [ 2944.854605][ T27] kauditd_printk_skb: 152 callbacks suppressed [ 2944.854619][ T27] audit: type=1400 audit(1576383868.043:83593): avc: denied { open } for pid=5440 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 2945.057719][ T27] audit: type=1400 audit(1576383868.083:83594): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=1134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:24:28 executing program 4: sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x8}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x89}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000240)='./file0/file0\x00', 0x155) r4 = getpid() setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f00000002c0)) ptrace(0x10, r4) ptrace$pokeuser(0x6, r4, 0x388, 0xfffffffffffffffe) 04:24:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000002d00)=[{{0x0, 0x0, 0x0}, 0x3}], 0x1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xa, 0x80}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x22f, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$P9_RSETATTR(r3, &(0x7f0000000180)={0x7}, 0x7) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000003c0)={0x22, 0x1, 0x2, 'queue0\x00', 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x6c00) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x3) write$binfmt_elf64(r4, &(0x7f0000001ec0)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[]], 0x8) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2945.243088][ T27] audit: type=1400 audit(1576383868.093:83595): avc: denied { kernel } for pid=5440 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 04:24:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x66, &(0x7f0000000200)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40985", 0x30, 0xffffff3a, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @empty, @local}}}}}}}, 0x0) 04:24:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xa, 0x80}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x22f, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$P9_RSETATTR(r3, &(0x7f0000000180)={0x7, 0x1b, 0x2}, 0x7) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000003c0)={0x22, 0x1, 0x2, 'queue0\x00', 0x1}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x19404, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_INTERRUPT(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x4}, 0x200000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x6c00) r5 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x3) write$binfmt_elf64(r5, &(0x7f0000001ec0)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[]], 0x8) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2945.384405][ T27] audit: type=1400 audit(1576383868.430:83596): avc: denied { open } for pid=5440 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 2945.528906][ T27] audit: type=1400 audit(1576383868.450:83597): avc: denied { kernel } for pid=5440 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 04:24:28 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) [ 2945.712046][ T27] audit: type=1400 audit(1576383868.519:83598): avc: denied { map } for pid=5546 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2945.866078][ T27] audit: type=1400 audit(1576383868.569:83599): avc: denied { map } for pid=5546 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2946.030808][ T27] audit: type=1400 audit(1576383868.569:83600): avc: denied { map } for pid=5546 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2946.198536][ T27] audit: type=1400 audit(1576383868.569:83601): avc: denied { map } for pid=5546 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000000), 0x81000005) 04:24:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$eventfd(r1, &(0x7f00000001c0), 0xffffff7f) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x10d000, 0x0) read$FUSE(r3, &(0x7f0000002200), 0x1000) r4 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x16d2) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r4}) [ 2946.438605][ T27] audit: type=1400 audit(1576383868.629:83602): avc: denied { map } for pid=5546 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:30 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) 04:24:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) readv(r0, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/234, 0xea}], 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000001900)={{0x100000080}, 'lort1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa6\xd3\xde\xb2\x00', 0xee}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{0x0, 0x1}, {0x80}}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x6011}) 04:24:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x66, &(0x7f0000000200)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40985", 0x30, 0xffffff3a, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @empty, @local}}}}}}}, 0x0) 04:24:30 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x100000421) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="28000000130045cf000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000000000000000008001a000400e79a265a2b0000940f0462688405a2c9df2856d505f3b70a56a82d200bc82697c6571be3d5268422c14aecff9c7b1b98c1c9bdc9480d8ca62059660310a4a20e8d1183000000000000"], 0x28}}, 0x0) 04:24:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) readv(r1, &(0x7f0000000680)=[{&(0x7f0000000200)=""/151, 0x97}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xff98, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(r3, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0054f) shutdown(r2, 0x0) shutdown(r3, 0x0) 04:24:31 executing program 1: openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(0xffffffffffffffff, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) 04:24:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmdt(0x0) recvfrom$inet(r1, 0x0, 0x1000002ec, 0x2, 0x0, 0x800e00549) shutdown(r0, 0x0) 04:24:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) readv(r1, &(0x7f0000000680)=[{&(0x7f0000000200)=""/151, 0x97}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xff98, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r3, 0xffff, 0x1006, &(0x7f0000000080), 0x10) recvfrom$inet(r3, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0054f) shutdown(r2, 0x0) shutdown(r3, 0x0) 04:24:32 executing program 1: openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(0xffffffffffffffff, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) 04:24:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x66, &(0x7f0000000200)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40985", 0x30, 0xffffff3a, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @empty, @local}}}}}}}, 0x0) 04:24:32 executing program 4: poll(&(0x7f0000001080)=[{}], 0x3, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x25f, 0x0, 0x0, 0x800e003bf) shutdown(0xffffffffffffffff, 0x1) readv(r0, &(0x7f0000002780)=[{&(0x7f00000010c0)=""/244, 0xf4}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r0, 0x0) 04:24:32 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:24:32 executing program 3: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000700)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "fdfcfec25def0a437ea0cf70c401dff625b53d7b7b9e7af3cf06803e4804d6a98e1c020477fc1516d942fe2bd33b69e14c3efc6f376f8019c04a18d983e85f", 0x3e}, 0x60, &(0x7f0000000d00)=[{&(0x7f00000008c0)="92ba3bd07e36851f7812d9ed6d2efc3ae8c748a7fea37b88b1b2c6acd52b12910d01fa5509dfe79f3820160d6c2c78a2aa0b70ddaf79cd880ea7305ff979b5e000f420fc36a8b3518ca54d9527ce490822ef1c3bb3a3662a82270c96ea4ce443ba6beb0ff8f8f2f6d5d0b12ee63ce5a54c093308fbc34a152eacfae98255c3a0c66d725bb8ad56a8ebc7a431c68ab826d2ba809d376aae8a2edb81c4bd1928e563724bf66c7a48c8a86788e3fbe3ddfa5c95c02bdae06a939c2ee2fdee8cf63f38abe698eb73f7ccd3b4eea0934d703f8d6f43b1ba78cad260a708c60897c7f33ac1bca649957257bb8559e9315b333e", 0xf0}, {&(0x7f00000009c0)="7a6c1893b793cd01b453d00e2a643a3a95b2ab683cb707b575366b5375c9e2db781565d650a5d1172dcea0bf9ae42c9b44f85544f74a8a4d7b29de70dc274fab147bfd4a4505fa4737cf8ee4705775c67bc8b01b8ea4f2cf6ef903806c7e7dfc461c72ae37089f8f5039ef2a0a6fd0dfe8fe602a48905f842ddc26da2c84e04e9e7f170eb25c249ef46fd0ecabe8e9108fa84d5f05bb350863e67f4b2002fa51d9cfcb54819366d9acf2e4bfc6c87e97f2e7a803", 0xb4}, {&(0x7f0000000a80)="2a2e86fc09017b5f17a9477baabfd3cffb3b1aaa5b0d3fdec0922953958096d9e3054cea5d5ae4757427516d2394458c55bf64ab28464c5fcdb7631ff6933381324a82b439743cdf161e7446707fe9218d9f122df4d042bc99d37cbbe51668035dc6437fc6d9276039fcf2a2b6abba58d7253a374a499b7f1f56f3b3e0c91fac515676d3776929002f9fbcf4", 0x8c}, {&(0x7f0000000b40)="8c89784f64485129654b1b4bea7d6305501220bbb8eea71cc6ca70646c89c5577129c201b33e50ebb5031bbf2e4c9ca5379bc9390137d109124b6799b127d71ebc72163bdd21303564c8edd79f2e1c1f899d419e7b41ca5a61b7999e507ebffe34eae964db9f4756aaada3667518eaa861b0e1cee101fa796be4c2740eb59a6339706de9f1e719f974510e7f182cd8a610b5a18723dd63080229d5c0d54e7f02eb9c84ccba5cb91292cc1d121812555ad0447c911e2cc57db60e58e53ea1ba514ca918aef40030e1b727dfc7dbcf537a", 0xd0}, {&(0x7f0000000c40)="fba7ed20aa23262c6fab9de205f4fa9dfeee665ec49b5705cfa790563f07c916b3a97afb041349f2b69bbca7d1b6734490378f1db3be73865b424e548c2bc0c744dd1f60cedde0b734dfa11030060466f1c9e253e2565b7d1ccda841cc0ce6602d54290832c62d1881957ef16dbc64696af89c1bfea55744bcdda872616b379bf5abba487fe17843", 0x88}], 0x5, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xfd, 0x80808}], 0x1, 0x40) recvmmsg(r1, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)=""/199, 0xc7}, {&(0x7f0000000300)=""/117, 0x75}], 0x2, &(0x7f0000000580)=""/115, 0x73}, 0x2}, {{&(0x7f0000000600)=@caif=@rfm, 0x80, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=""/100, 0xffffffffffffff02}}, {{&(0x7f0000000840)=@nl=@proc, 0x80, 0x0}, 0x10001}, {{0x0, 0x0, &(0x7f0000002bc0)}, 0x8}, {{&(0x7f0000002e40)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f00000042c0)=[{0x0}, {0x0}, {&(0x7f0000004000)=""/74, 0x50}, {&(0x7f0000004140)=""/85, 0x55}], 0x4, &(0x7f0000004340)=""/144, 0x90}, 0x4}, {{&(0x7f00000047c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f0000004840), 0x0, &(0x7f0000004880)=""/39, 0x27}, 0x6}], 0x6, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000100)={0x3, 0xfff, 0x6, 0xd550, 0x2, 0x1}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0xa, 0x2400000002, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000240)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r4, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2, 0x0) writev(r5, &(0x7f0000001640)=[{&(0x7f00000001c0)="e1", 0x1}], 0x1) ioctl$SNDCTL_DSP_SYNC(r5, 0x5001, 0x0) ioctl$SNDCTL_DSP_STEREO(r5, 0xc0045003, &(0x7f0000000040)=0x1) r6 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2, 0x0) writev(r6, &(0x7f0000001640)=[{&(0x7f00000001c0)="e1", 0x1}], 0x1) ioctl$SNDCTL_DSP_STEREO(r6, 0xc0045003, &(0x7f0000000040)=0x1) ioctl$FICLONE(r5, 0x40049409, r6) 04:24:33 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2949.949393][ T27] kauditd_printk_skb: 150 callbacks suppressed [ 2949.949407][ T27] audit: type=1400 audit(1576383873.091:83753): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2950.150227][ T27] audit: type=1400 audit(1576383873.161:83754): avc: denied { map } for pid=6912 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='io\x00') r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r0, 0x8, 0x0, 0x8000) [ 2950.302252][ T27] audit: type=1400 audit(1576383873.171:83755): avc: denied { map } for pid=6912 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2950.445948][ T27] audit: type=1400 audit(1576383873.180:83756): avc: denied { map } for pid=6912 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2950.610071][ T27] audit: type=1400 audit(1576383873.190:83757): avc: denied { map } for pid=6912 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2950.770976][ T27] audit: type=1400 audit(1576383873.250:83758): avc: denied { map } for pid=6912 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:34 executing program 1: openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(0xffffffffffffffff, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x2}, 0x61) [ 2950.928159][ T27] audit: type=1400 audit(1576383873.280:83759): avc: denied { map } for pid=6912 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:34 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1}) unshare(0x40600) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="99", 0x1}], 0x1, 0x0) 04:24:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x2000000, 0x4) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r0, 0x8, 0x0, 0x8000) [ 2951.220220][ T27] audit: type=1400 audit(1576383873.329:83760): avc: denied { map } for pid=6912 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x01a\x00\x80'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xb779ef21efb66f11}) [ 2951.416852][ T27] audit: type=1400 audit(1576383873.349:83761): avc: denied { map } for pid=6912 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2951.614291][ T27] audit: type=1400 audit(1576383873.349:83762): avc: denied { map } for pid=6912 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:24:35 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, 0x0, 0x0) 04:24:35 executing program 0: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000700)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "fdfcfec25def0a437ea0cf70c401dff625b53d7b7b9e7af3cf06803e4804d6a98e1c020477fc1516d942fe2bd33b69e14c3efc6f376f8019c04a18d983e85f", 0x3e}, 0x60, &(0x7f0000000d00)=[{&(0x7f00000008c0)="92ba3bd07e36851f7812d9ed6d2efc3ae8c748a7fea37b88b1b2c6acd52b12910d01fa5509dfe79f3820160d6c2c78a2aa0b70ddaf79cd880ea7305ff979b5e000f420fc36a8b3518ca54d9527ce490822ef1c3bb3a3662a82270c96ea4ce443ba6beb0ff8f8f2f6d5d0b12ee63ce5a54c093308fbc34a152eacfae98255c3a0c66d725bb8ad56a8ebc7a431c68ab826d2ba809d376aae8a2edb81c4bd1928e563724bf66c7a48c8a86788e3fbe3ddfa5c95c02bdae06a939c2ee2fdee8cf63f38abe698eb73f7ccd3b4eea0934d703f8d6f43b1ba78cad260a708c60897c7f33ac1bca649957257bb8559e9315b333e", 0xf0}, {&(0x7f00000009c0)="7a6c1893b793cd01b453d00e2a643a3a95b2ab683cb707b575366b5375c9e2db781565d650a5d1172dcea0bf9ae42c9b44f85544f74a8a4d7b29de70dc274fab147bfd4a4505fa4737cf8ee4705775c67bc8b01b8ea4f2cf6ef903806c7e7dfc461c72ae37089f8f5039ef2a0a6fd0dfe8fe602a48905f842ddc26da2c84e04e9e7f170eb25c249ef46fd0ecabe8e9108fa84d5f05bb350863e67f4b2002fa51d9cfcb54819366d9acf2e4bfc6c87e97f2e7a803", 0xb4}, {&(0x7f0000000a80)="2a2e86fc09017b5f17a9477baabfd3cffb3b1aaa5b0d3fdec0922953958096d9e3054cea5d5ae4757427516d2394458c55bf64ab28464c5fcdb7631ff6933381324a82b439743cdf161e7446707fe9218d9f122df4d042bc99d37cbbe51668035dc6437fc6d9276039fcf2a2b6abba58d7253a374a499b7f1f56f3b3e0c91fac515676d3776929002f9fbcf4", 0x8c}, {&(0x7f0000000b40)="8c89784f64485129654b1b4bea7d6305501220bbb8eea71cc6ca70646c89c5577129c201b33e50ebb5031bbf2e4c9ca5379bc9390137d109124b6799b127d71ebc72163bdd21303564c8edd79f2e1c1f899d419e7b41ca5a61b7999e507ebffe34eae964db9f4756aaada3667518eaa861b0e1cee101fa796be4c2740eb59a6339706de9f1e719f974510e7f182cd8a610b5a18723dd63080229d5c0d54e7f02eb9c84ccba5cb91292cc1d121812555ad0447c911e2cc57db60e58e53ea1ba514ca918aef40030e1b727dfc7dbcf537a", 0xd0}, {&(0x7f0000000c40)="fba7ed20aa23262c6fab9de205f4fa9dfeee665ec49b5705cfa790563f07c916b3a97afb041349f2b69bbca7d1b6734490378f1db3be73865b424e548c2bc0c744dd1f60cedde0b734dfa11030060466f1c9e253e2565b7d1ccda841cc0ce6602d54290832c62d1881957ef16dbc64696af89c1bfea55744bcdda872616b379bf5abba487fe17843", 0x88}], 0x5, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xfd, 0x80808}], 0x1, 0x40) recvmmsg(r1, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)=""/199, 0xc7}, {&(0x7f0000000300)=""/117, 0x75}], 0x2, &(0x7f0000000580)=""/115, 0x73}, 0x2}, {{&(0x7f0000000600)=@caif=@rfm, 0x80, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=""/100, 0xffffffffffffff02}}, {{&(0x7f0000000840)=@nl=@proc, 0x80, 0x0}, 0x10001}, {{0x0, 0x0, &(0x7f0000002bc0)}, 0x8}, {{&(0x7f0000002e40)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f00000042c0)=[{0x0}, {0x0}, {&(0x7f0000004000)=""/74, 0x50}, {&(0x7f0000004140)=""/85, 0x55}], 0x4, &(0x7f0000004340)=""/144, 0x90}, 0x4}, {{&(0x7f00000047c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f0000004840), 0x0, &(0x7f0000004880)=""/39, 0x27}, 0x6}], 0x6, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000100)={0x3, 0xfff, 0x6, 0xd550, 0x2, 0x1}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0xa, 0x2400000002, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000240)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r4, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2, 0x0) writev(r5, &(0x7f0000001640)=[{&(0x7f00000001c0)="e1", 0x1}], 0x1) ioctl$SNDCTL_DSP_SYNC(r5, 0x5001, 0x0) ioctl$SNDCTL_DSP_STEREO(r5, 0xc0045003, &(0x7f0000000040)=0x1) r6 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2, 0x0) ioctl$SNDCTL_DSP_STEREO(r6, 0xc0045003, &(0x7f0000000040)=0x1) ioctl$FICLONE(r5, 0x40049409, r6) [ 2952.520936][ T7445] bridge0: port 4(team0) entered disabled state [ 2952.527515][ T7445] bridge0: port 3(gretap0) entered disabled state [ 2952.534183][ T7445] bridge0: port 2(bridge_slave_1) entered disabled state [ 2952.541455][ T7445] bridge0: port 1(bridge_slave_0) entered disabled state 04:24:36 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, 0x0, 0x0) 04:24:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 04:24:36 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000700)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "fdfcfec25def0a437ea0cf70c401dff625b53d7b7b9e7af3cf06803e4804d6a98e1c020477fc1516d942fe2bd33b69e14c3efc6f376f8019c04a18d983e85f", 0x3e}, 0x60, &(0x7f0000000d00)=[{&(0x7f00000008c0)="92ba3bd07e36851f7812d9ed6d2efc3ae8c748a7fea37b88b1b2c6acd52b12910d01fa5509dfe79f3820160d6c2c78a2aa0b70ddaf79cd880ea7305ff979b5e000f420fc36a8b3518ca54d9527ce490822ef1c3bb3a3662a82270c96ea4ce443ba6beb0ff8f8f2f6d5d0b12ee63ce5a54c093308fbc34a152eacfae98255c3a0c66d725bb8ad56a8ebc7a431c68ab826d2ba809d376aae8a2edb81c4bd1928e563724bf66c7a48c8a86788e3fbe3ddfa5c95c02bdae06a939c2ee2fdee8cf63f38abe698eb73f7ccd3b4eea0934d703f8d6f43b1ba78cad260a708c60897c7f33ac1bca649957257bb8559e9315b333e", 0xf0}, {&(0x7f00000009c0)="7a6c1893b793cd01b453d00e2a643a3a95b2ab683cb707b575366b5375c9e2db781565d650a5d1172dcea0bf9ae42c9b44f85544f74a8a4d7b29de70dc274fab147bfd4a4505fa4737cf8ee4705775c67bc8b01b8ea4f2cf6ef903806c7e7dfc461c72ae37089f8f5039ef2a0a6fd0dfe8fe602a48905f842ddc26da2c84e04e9e7f170eb25c249ef46fd0ecabe8e9108fa84d5f05bb350863e67f4b2002fa51d9cfcb54819366d9acf2e4bfc6c87e97f2e7a803", 0xb4}, {&(0x7f0000000a80)="2a2e86fc09017b5f17a9477baabfd3cffb3b1aaa5b0d3fdec0922953958096d9e3054cea5d5ae4757427516d2394458c55bf64ab28464c5fcdb7631ff6933381324a82b439743cdf161e7446707fe9218d9f122df4d042bc99d37cbbe51668035dc6437fc6d9276039fcf2a2b6abba58d7253a374a499b7f1f56f3b3e0c91fac515676d3776929002f9fbcf4", 0x8c}, {&(0x7f0000000b40)="8c89784f64485129654b1b4bea7d6305501220bbb8eea71cc6ca70646c89c5577129c201b33e50ebb5031bbf2e4c9ca5379bc9390137d109124b6799b127d71ebc72163bdd21303564c8edd79f2e1c1f899d419e7b41ca5a61b7999e507ebffe34eae964db9f4756aaada3667518eaa861b0e1cee101fa796be4c2740eb59a6339706de9f1e719f974510e7f182cd8a610b5a18723dd63080229d5c0d54e7f02eb9c84ccba5cb91292cc1d121812555ad0447c911e2cc57db60e58e53ea1ba514ca918aef40030e1b727dfc7dbcf537a", 0xd0}, {&(0x7f0000000c40)="fba7ed20aa23262c6fab9de205f4fa9dfeee665ec49b5705cfa790563f07c916b3a97afb041349f2b69bbca7d1b6734490378f1db3be73865b424e548c2bc0c744dd1f60cedde0b734dfa11030060466f1c9e253e2565b7d1ccda841cc0ce6602d54290832c62d1881957ef16dbc64696af89c1bfea55744bcdda872616b379bf5abba487fe17843", 0x88}], 0x5, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xfd, 0x80808}], 0x1, 0x40) recvmmsg(r1, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)=""/199, 0xc7}, {&(0x7f0000000300)=""/117, 0x75}], 0x2, &(0x7f0000000580)=""/115, 0x73}, 0x2}, {{&(0x7f0000000600)=@caif=@rfm, 0x80, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=""/100, 0xffffffffffffff02}}, {{&(0x7f0000000840)=@nl=@proc, 0x80, 0x0}, 0x10001}, {{0x0, 0x0, &(0x7f0000002bc0)}, 0x8}, {{&(0x7f0000002e40)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f00000042c0)=[{0x0}, {0x0}, {&(0x7f0000004000)=""/74, 0x50}, {&(0x7f0000004140)=""/85, 0x55}], 0x4, &(0x7f0000004340)=""/144, 0x90}, 0x4}, {{&(0x7f00000047c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f0000004840), 0x0, &(0x7f0000004880)=""/39, 0x27}, 0x6}], 0x6, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000100)={0x3, 0xfff, 0x6, 0xd550, 0x2, 0x1}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0xa, 0x2400000002, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000240)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2, 0x0) writev(r5, &(0x7f0000001640)=[{&(0x7f00000001c0)="e1", 0x1}], 0x1) ioctl$SNDCTL_DSP_SYNC(r5, 0x5001, 0x0) ioctl$SNDCTL_DSP_STEREO(r5, 0xc0045003, &(0x7f0000000040)=0x1) r6 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2, 0x0) writev(r6, &(0x7f0000001640)=[{&(0x7f00000001c0)="e1", 0x1}], 0x1) ioctl$SNDCTL_DSP_STEREO(r6, 0xc0045003, &(0x7f0000000040)=0x1) ioctl$FICLONE(r5, 0x40049409, r6) 04:24:36 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000700)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "fdfcfec25def0a437ea0cf70c401dff625b53d7b7b9e7af3cf06803e4804d6a98e1c020477fc1516d942fe2bd33b69e14c3efc6f376f8019c04a18d983e85f", 0x3e}, 0x60, &(0x7f0000000d00)=[{&(0x7f00000008c0)="92ba3bd07e36851f7812d9ed6d2efc3ae8c748a7fea37b88b1b2c6acd52b12910d01fa5509dfe79f3820160d6c2c78a2aa0b70ddaf79cd880ea7305ff979b5e000f420fc36a8b3518ca54d9527ce490822ef1c3bb3a3662a82270c96ea4ce443ba6beb0ff8f8f2f6d5d0b12ee63ce5a54c093308fbc34a152eacfae98255c3a0c66d725bb8ad56a8ebc7a431c68ab826d2ba809d376aae8a2edb81c4bd1928e563724bf66c7a48c8a86788e3fbe3ddfa5c95c02bdae06a939c2ee2fdee8cf63f38abe698eb73f7ccd3b4eea0934d703f8d6f43b1ba78cad260a708c60897c7f33ac1bca649957257bb8559e9315b333e", 0xf0}, {&(0x7f00000009c0)="7a6c1893b793cd01b453d00e2a643a3a95b2ab683cb707b575366b5375c9e2db781565d650a5d1172dcea0bf9ae42c9b44f85544f74a8a4d7b29de70dc274fab147bfd4a4505fa4737cf8ee4705775c67bc8b01b8ea4f2cf6ef903806c7e7dfc461c72ae37089f8f5039ef2a0a6fd0dfe8fe602a48905f842ddc26da2c84e04e9e7f170eb25c249ef46fd0ecabe8e9108fa84d5f05bb350863e67f4b2002fa51d9cfcb54819366d9acf2e4bfc6c87e97f2e7a803", 0xb4}, {&(0x7f0000000a80)="2a2e86fc09017b5f17a9477baabfd3cffb3b1aaa5b0d3fdec0922953958096d9e3054cea5d5ae4757427516d2394458c55bf64ab28464c5fcdb7631ff6933381324a82b439743cdf161e7446707fe9218d9f122df4d042bc99d37cbbe51668035dc6437fc6d9276039fcf2a2b6abba58d7253a374a499b7f1f56f3b3e0c91fac515676d3776929002f9fbcf4", 0x8c}, {&(0x7f0000000b40)="8c89784f64485129654b1b4bea7d6305501220bbb8eea71cc6ca70646c89c5577129c201b33e50ebb5031bbf2e4c9ca5379bc9390137d109124b6799b127d71ebc72163bdd21303564c8edd79f2e1c1f899d419e7b41ca5a61b7999e507ebffe34eae964db9f4756aaada3667518eaa861b0e1cee101fa796be4c2740eb59a6339706de9f1e719f974510e7f182cd8a610b5a18723dd63080229d5c0d54e7f02eb9c84ccba5cb91292cc1d121812555ad0447c911e2cc57db60e58e53ea1ba514ca918aef40030e1b727dfc7dbcf537a", 0xd0}, {&(0x7f0000000c40)="fba7ed20aa23262c6fab9de205f4fa9dfeee665ec49b5705cfa790563f07c916b3a97afb041349f2b69bbca7d1b6734490378f1db3be73865b424e548c2bc0c744dd1f60cedde0b734dfa11030060466f1c9e253e2565b7d1ccda841cc0ce6602d54290832c62d1881957ef16dbc64696af89c1bfea55744bcdda872616b379bf5abba487fe17843", 0x88}], 0x5, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xfd, 0x80808}], 0x1, 0x40) recvmmsg(r1, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)=""/199, 0xc7}, {&(0x7f0000000300)=""/117, 0x75}], 0x2, &(0x7f0000000580)=""/115, 0x73}, 0x2}, {{&(0x7f0000000600)=@caif=@rfm, 0x80, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=""/100, 0xffffffffffffff02}}, {{&(0x7f0000000840)=@nl=@proc, 0x80, 0x0}, 0x10001}, {{0x0, 0x0, &(0x7f0000002bc0)}, 0x8}, {{&(0x7f0000002e40)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f00000042c0)=[{0x0}, {0x0}, {&(0x7f0000004000)=""/74, 0x50}, {&(0x7f0000004140)=""/85, 0x55}], 0x4, &(0x7f0000004340)=""/144, 0x90}, 0x4}, {{&(0x7f00000047c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f0000004840), 0x0, &(0x7f0000004880)=""/39, 0x27}, 0x6}], 0x6, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000100)={0x3, 0xfff, 0x6, 0xd550, 0x2, 0x1}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0xa, 0x2400000002, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000240)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r4, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2, 0x0) writev(r5, &(0x7f0000001640)=[{&(0x7f00000001c0)="e1", 0x1}], 0x1) ioctl$SNDCTL_DSP_SYNC(r5, 0x5001, 0x0) ioctl$SNDCTL_DSP_STEREO(r5, 0xc0045003, &(0x7f0000000040)=0x1) r6 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2, 0x0) ioctl$FICLONE(r5, 0x40049409, r6) 04:24:36 executing program 3: 04:24:36 executing program 5: 04:24:37 executing program 0: 04:24:37 executing program 4: 04:24:37 executing program 2: 04:24:38 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, 0x0, 0x0) 04:24:38 executing program 5: [ 2955.045142][ T27] kauditd_printk_skb: 145 callbacks suppressed [ 2955.045157][ T27] audit: type=1400 audit(1576383878.149:83908): avc: denied { map } for pid=8252 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:38 executing program 3: [ 2955.236557][ T27] audit: type=1400 audit(1576383878.228:83909): avc: denied { map } for pid=8252 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:38 executing program 4: [ 2955.416475][ T27] audit: type=1400 audit(1576383878.258:83910): avc: denied { map } for pid=8275 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:38 executing program 0: [ 2955.535953][ T27] audit: type=1400 audit(1576383878.288:83911): avc: denied { watch } for pid=11810 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:24:38 executing program 2: [ 2955.784847][ T27] audit: type=1400 audit(1576383878.298:83912): avc: denied { map } for pid=8252 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2955.949944][ T27] audit: type=1400 audit(1576383878.298:83913): avc: denied { map } for pid=8252 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:39 executing program 5: [ 2956.151468][ T27] audit: type=1400 audit(1576383878.317:83914): avc: denied { map } for pid=8275 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2956.281884][ T27] audit: type=1400 audit(1576383878.317:83915): avc: denied { map } for pid=8275 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:39 executing program 3: 04:24:39 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x61) [ 2956.411763][ T27] audit: type=1400 audit(1576383878.317:83916): avc: denied { map } for pid=8275 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:39 executing program 4: [ 2956.553006][ T27] audit: type=1400 audit(1576383878.337:83917): avc: denied { map } for pid=8252 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:39 executing program 0: 04:24:39 executing program 2: 04:24:40 executing program 5: 04:24:40 executing program 4: 04:24:40 executing program 3: 04:24:40 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x61) 04:24:40 executing program 0: 04:24:40 executing program 2: 04:24:41 executing program 0: 04:24:41 executing program 5: 04:24:41 executing program 3: 04:24:41 executing program 4: 04:24:41 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x61) 04:24:42 executing program 2: 04:24:42 executing program 5: 04:24:42 executing program 0: 04:24:42 executing program 4: 04:24:42 executing program 2: 04:24:42 executing program 3: 04:24:43 executing program 1: [ 2960.254312][ T27] kauditd_printk_skb: 165 callbacks suppressed [ 2960.254326][ T27] audit: type=1400 audit(1576383883.316:84083): avc: denied { map } for pid=8320 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:43 executing program 5: [ 2960.550209][ T27] audit: type=1400 audit(1576383883.405:84084): avc: denied { map } for pid=8320 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:43 executing program 0: [ 2960.722740][ T27] audit: type=1400 audit(1576383883.425:84085): avc: denied { map } for pid=8320 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:43 executing program 4: 04:24:43 executing program 2: [ 2960.931096][ T27] audit: type=1400 audit(1576383883.425:84086): avc: denied { map } for pid=8320 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:44 executing program 1: [ 2961.059671][ T27] audit: type=1400 audit(1576383883.445:84087): avc: denied { watch } for pid=11812 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=1135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:24:44 executing program 3: [ 2961.263872][ T27] audit: type=1400 audit(1576383883.504:84088): avc: denied { map } for pid=8320 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2961.428924][ T27] audit: type=1400 audit(1576383883.554:84089): avc: denied { watch } for pid=12236 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=1134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:24:44 executing program 5: [ 2961.657216][ T27] audit: type=1400 audit(1576383883.593:84090): avc: denied { map } for pid=8320 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:44 executing program 0: 04:24:44 executing program 2: [ 2961.834235][ T27] audit: type=1400 audit(1576383883.603:84091): avc: denied { map } for pid=8320 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:44 executing program 4: [ 2962.035341][ T27] audit: type=1400 audit(1576383883.613:84092): avc: denied { map } for pid=8323 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:45 executing program 1: 04:24:45 executing program 3: 04:24:45 executing program 5: 04:24:46 executing program 0: 04:24:46 executing program 2: 04:24:46 executing program 4: 04:24:46 executing program 3: 04:24:46 executing program 1: 04:24:46 executing program 5: 04:24:46 executing program 0: 04:24:47 executing program 2: 04:24:47 executing program 3: 04:24:47 executing program 4: 04:24:47 executing program 1: 04:24:47 executing program 5: 04:24:47 executing program 0: 04:24:48 executing program 4: 04:24:48 executing program 2: 04:24:48 executing program 3: 04:24:48 executing program 1: [ 2965.467903][ T27] kauditd_printk_skb: 169 callbacks suppressed [ 2965.467918][ T27] audit: type=1400 audit(1576383888.482:84262): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2965.641733][ T27] audit: type=1400 audit(1576383888.582:84263): avc: denied { watch } for pid=11810 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:24:48 executing program 4: 04:24:48 executing program 2: [ 2965.821753][ T27] audit: type=1400 audit(1576383888.631:84264): avc: denied { map } for pid=8367 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:49 executing program 5: [ 2965.952795][ T27] audit: type=1400 audit(1576383888.701:84265): avc: denied { map } for pid=8367 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:49 executing program 0: [ 2966.059499][ T27] audit: type=1400 audit(1576383888.701:84266): avc: denied { map } for pid=8367 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:49 executing program 3: [ 2966.227454][ T27] audit: type=1400 audit(1576383888.701:84267): avc: denied { map } for pid=8367 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:49 executing program 4: [ 2966.448155][ T27] audit: type=1400 audit(1576383888.750:84268): avc: denied { watch } for pid=12236 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2966.650057][ T27] audit: type=1400 audit(1576383888.770:84269): avc: denied { map } for pid=8367 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:49 executing program 1: 04:24:49 executing program 2: [ 2966.825580][ T27] audit: type=1400 audit(1576383888.810:84270): avc: denied { map } for pid=8367 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2966.984943][ T27] audit: type=1400 audit(1576383888.810:84271): avc: denied { map } for pid=8367 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:50 executing program 5: 04:24:50 executing program 3: 04:24:50 executing program 4: 04:24:50 executing program 0: 04:24:50 executing program 1: 04:24:50 executing program 4: 04:24:50 executing program 5: 04:24:51 executing program 2: 04:24:51 executing program 3: 04:24:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f08864e0ff0005a4000057ff3377fbac141416e9", 0x0, 0x100}, 0x28) 04:24:51 executing program 2: 04:24:51 executing program 1: 04:24:51 executing program 5: 04:24:52 executing program 4: 04:24:52 executing program 3: 04:24:52 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000080)) 04:24:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) write(r0, 0x0, 0x0) 04:24:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000280), 0x24, 0x3) 04:24:52 executing program 1: r0 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='/dev/keychord\x00', 0x1) pwritev(r2, &(0x7f0000000440)=[{&(0x7f0000000480)="a8", 0x1}], 0x1, 0x81003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000000)="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") ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fcntl$setstatus(r0, 0x4, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000001c0)={'caif0\x00', 0x3}) sendfile(r1, r0, 0x0, 0x7ffff) 04:24:53 executing program 3: r0 = open(0x0, 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(0x0, 0x1) pwritev(r2, &(0x7f0000000440)=[{0x0}], 0x1, 0x81003) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_udp_int(r4, 0x11, 0xb, &(0x7f0000000100), 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000000)="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") ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) fcntl$setstatus(r0, 0x4, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup2(r5, 0xffffffffffffffff) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000001c0)={'caif0\x00', 0x3}) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff) 04:24:53 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x16) [ 2970.518904][ T27] kauditd_printk_skb: 148 callbacks suppressed [ 2970.518917][ T27] audit: type=1400 audit(1576383893.490:84420): avc: denied { map } for pid=8510 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2970.712324][ T27] audit: type=1400 audit(1576383893.490:84421): avc: denied { map } for pid=8510 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2970.880651][ T27] audit: type=1400 audit(1576383893.530:84423): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=1135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:24:54 executing program 5: add_key$user(&(0x7f00000000c0)='user\x00', 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x4, &(0x7f0000000300)=[{&(0x7f0000000000)="a73d70b27fcca411c3811825e911140298174c844f4904ec38a8111a03b949f0c2041095dca78075bc56afed4fab42648c832dae1c9abd52912c7fdb30cd6e0d75bf9a74a7ab24ddff393214e30c6bbbc0d49008ffa1b8f4a5743e13f995bfd5dbaa41c322a77c7a51c987dc177705d3f0151454eb0b534af441859b60fc8bc9da1aef53ba78a6bf30259b529177d79179e07f8f5bda9454fe3fecc3f20b14f8aa9bd84c8ae0b4366cad80c0e1e92541c45000831fca833d361eb5", 0x2c8, 0x20}, {&(0x7f0000000100)="fece2c262c7304f17ba2a84e300af9fce68ad901940e8fb2fc103c0989d4962eb1058614416279921c65a6b86f8678221b3f600a30adc7b2ab0fd89456b2bba69deb1a608ff90c5a89221773d8bac71b495a527e7939994a8044f68c9caeff320dac63aa6480df05af610d30c181aa40533031e53c4300c3fb73b999d01f714d", 0x80, 0x200}, {&(0x7f0000000180)="ca5237a3b057af6af9c39f7d6543f365860563c9b11d8538d2a721b842b7210c75fb9db6a65b0cc754d103de68ba3f324e1759ddb978b40c21697c5ebc288d536def00000002ec552f409a2489604a98077a6f3551e89695192402e09c3d6250e6253c6acc01839b", 0x68, 0x7}, {&(0x7f0000000200)="53889ee6baa41a14abada62e2d99cdad7e99261096e746dbf2fa4d5806b2acbab48c27142a496934f1c54eea29f1c127e44138641daa2c821c92b51087544dcfebe5cbe501d1d2618fb152a8dd472377b2df8459e51baeab08b2265d0b5e551ed5fe4a822ea46af299f062db059d41704907adabcfc709d3ae40ee08930fb11f1f5fce7a3d2a32ab93fcfa5c8923850aa187bdcb53bbc305b76a53c69977093b16d486f9751363d67b0e0b8721968a2d0579899d7b16356cce3cbee0c9ca5dbbdb5565bea1c73b38b4", 0xc9, 0x7}]) [ 2971.075096][ T27] audit: type=1400 audit(1576383893.550:84424): avc: denied { map } for pid=8508 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2971.282201][ T27] audit: type=1400 audit(1576383893.490:84422): avc: denied { map } for pid=8510 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2971.467748][ T27] audit: type=1400 audit(1576383893.550:84425): avc: denied { map } for pid=8510 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2971.651756][ T27] audit: type=1400 audit(1576383893.560:84426): avc: denied { map } for pid=8508 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:54 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffc30, 0xfffffffffffffffe) keyctl$read(0xb, r1, 0x0, 0x0) r2 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="27353432775e484363c0eea88c88f514e4a2f93d2dc8ab50085b9d657356e6bfa9286db431213b13af", 0x29, r1) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000280)=[{&(0x7f0000000180)="7709d1622adb8972b57787c4446e32ead5d89a572cc7c76c24eb107e7621f5c518218a94343d44fd42e2904696c6f33e83585b1eb1835a4c9a8559313657db9131bf25b997e0f914e891d8c5098814381f3cfaa20303b7d0c98c4add67b6525deaefe3aa003382189d6b6d396dcf3a53eeb93f6e21de096dae7dbafd946a591f4fc5890103d0c1f588832d4aaa40a8f0a402e3c14a7ef56c3a117b0019ecc3100351dd4699a21bd18f6abb07cca5e908dde259cd86e39ef44661f924d566a313325d2a616294b3451bb5e5", 0xcb}], 0x1, r2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)=0x0) r6 = socket(0x11, 0x1, 0x20) sendmsg$key(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)={0x2, 0x12, 0x7, 0x0, 0x23, 0x0, 0x70bd2c, 0x25dfdbfb, [@sadb_spirange={0x2, 0x10, 0x4d4, 0x4d4}, @sadb_x_filter={0x5, 0x1a, @in6=@remote, @in=@broadcast, 0x5, 0x1c, 0x4}, @sadb_x_sec_ctx={0x12, 0x18, 0x3, 0x2, 0x81, "7261badaa3d183630c23bed69165e769fa29252d728ce802463a9bf136b6b1e58fac48de6f31f20c09bd8c903b31fdc2aa3fc930f7412966c0a000dcc2a9db829cb3f9f12b648c1480c78ad0af486aa8f75d48be828216d464ada9e7ddc755a92f97f4d9bff77f77463d519440e4d3703edee7160eeeb48ce250642e7c2c79b682"}, @sadb_x_policy={0x8, 0x12, 0x1, 0xba6447772dfff8b7, 0x0, 0x6e6bb6, 0x90, {0x6, 0x32, 0xda, 0x0, 0x0, 0x9, 0x0, @in=@rand_addr=0xdae, @in6=@rand_addr="90544ba48d90d56de3ebb423ee42b6c7"}}]}, 0x118}}, 0x4) fcntl$getown(r3, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f0000000000)) ptrace(0x10, r7) ptrace$peeksig(0x4209, r7, 0x0, 0x0) getpgrp(r5) r8 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x53adc69e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r11, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r10, r11, &(0x7f0000000000), 0xffff) fcntl$addseals(r11, 0x409, 0x8) r12 = socket$packet(0x11, 0x3, 0x300) r13 = dup3(r12, r11, 0x0) dup3(r13, r9, 0x0) ioctl$VHOST_SET_MEM_TABLE(r13, 0x4008af03, &(0x7f0000001840)={0x4, 0x0, [{0x2000, 0x1000, &(0x7f00000005c0)=""/4096}, {0x4, 0x92, &(0x7f00000015c0)=""/146}, {0xf000, 0xa3, &(0x7f0000001680)=""/163}, {0x5000, 0xd7, &(0x7f0000001740)=""/215}]}) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x4b564d02, 0x3]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) [ 2971.801361][ T27] audit: type=1400 audit(1576383893.560:84427): avc: denied { map } for pid=8508 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:54 executing program 4: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) remap_file_pages(&(0x7f000020e000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 2971.976851][ T27] audit: type=1400 audit(1576383893.560:84428): avc: denied { map } for pid=8508 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:55 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 2972.144240][ T27] audit: type=1400 audit(1576383893.570:84429): avc: denied { map } for pid=8510 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x42000, 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r4, 0x409, 0x8) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup3(r5, r4, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) 04:24:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fcntl$addseals(r4, 0x409, 0x8) r5 = socket$packet(0x11, 0x3, 0x300) dup3(r5, r4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:24:55 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:24:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r1, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0xfffffd89}], 0x1}}], 0x1, 0x100, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 04:24:56 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:24:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000300)='/dev/capi20\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000580)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 04:24:56 executing program 0: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 04:24:56 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe2(&(0x7f00000004c0), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)={'syz1', "9d6ccd7b2ffbe8e54f4b697020c8b8936f"}, 0x15) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xcec, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000001c00006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 04:24:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8d}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x50, 0x4, 0x40000000000008, 0x319, 0x0, 0x0, {}, [@typed={0x8, 0x2, @pid}, @typed={0x34, 0x3, @str='keyringeth0vmnet1cgroupppp1[eth0vboxnet1user\x00'}]}, 0x50}}, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000001500)={0xe1, 0xfffffffa, 0x2}, 0xc) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f00000004c0)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000100)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x80000000000000a, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r5, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) accept4$inet(r5, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f00000001c0)=0x10, 0x80000) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 04:24:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000280)={0x79}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:24:58 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 04:24:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0xfffffd89}], 0x1}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0x8, &(0x7f0000000180)) getdents64(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x80000, 0x1f) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) [ 2975.305491][ T9949] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2975.379158][ T9949] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 04:24:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)=""/121, 0x79}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)=""/180, 0xb4}, {0x0}, {0x0}], 0x3}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xd051, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) [ 2975.786765][ T27] kauditd_printk_skb: 168 callbacks suppressed [ 2975.786779][ T27] audit: type=1400 audit(1576383898.727:84598): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=1134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2976.027729][ T27] audit: type=1400 audit(1576383898.746:84599): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:24:59 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) [ 2976.251932][ T27] audit: type=1400 audit(1576383898.895:84600): avc: denied { map } for pid=10085 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:59 executing program 4: clone(0x9140d100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x4000000000000016, &(0x7f0000000600)) ptrace(0x4206, r0) [ 2976.411754][ T27] audit: type=1400 audit(1576383898.915:84601): avc: denied { map } for pid=10085 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2976.569268][ T27] audit: type=1400 audit(1576383898.955:84602): avc: denied { map } for pid=10085 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:24:59 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x4000000000002, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, 0x0) 04:24:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r1, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0xfffffd89}], 0x1}}], 0x1, 0x100, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) [ 2976.772817][ T27] audit: type=1400 audit(1576383899.004:84603): avc: denied { map } for pid=10085 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2976.975801][ T27] audit: type=1400 audit(1576383899.014:84604): avc: denied { watch } for pid=11810 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2977.209394][ T27] audit: type=1400 audit(1576383899.044:84605): avc: denied { map } for pid=10085 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:00 executing program 5: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x20000, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000340), 0x4) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/de\x00', 0x969167a471eb7fdc, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc040564a, &(0x7f0000000200)) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x8, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x2, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x2, 0x0, 0xfffffdac) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8642957429963afb, @perf_bp={0x0, 0x8}, 0x10080, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clone(0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="18f60a2111586ff65f2573aab50febd1d64fbb4158f63355602481443fece7a1f642d7754be2dbbcd0a5afdcf5e5f5fa7bac7fa790a735e74bb290d2ccdd91d9eacb6ed623261827e03be7b7622d9dabee3c4c88") [ 2977.399324][ T27] audit: type=1400 audit(1576383899.094:84606): avc: denied { map } for pid=10085 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2977.548516][ T27] audit: type=1400 audit(1576383899.123:84607): avc: denied { map } for pid=10085 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:00 executing program 0: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 04:25:00 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}, 0x7}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_LSEEK(r2, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x10400003) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, @perf_bp={&(0x7f0000000300)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvme-fabrics\x00', 0x41a001, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x100000000) r5 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x200) sendfile(r5, r6, 0x0, 0x7fffffff) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000001c0)) 04:25:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x50000}]}) r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) 04:25:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000001c0)=0x32, 0x118) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 04:25:01 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x50000}]}) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RGETATTR(r0, 0x0, 0x0) 04:25:01 executing program 0: socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d00070000000000008100000c0010000000001d00000000"], 0x1c}}, 0x0) 04:25:02 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = getpgrp(0xffffffffffffffff) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r6, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={r4, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r10 = getpgrp(0xffffffffffffffff) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r12, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r13 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={r10, r13, r14}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r16 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r16, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r17 = getpgrp(0xffffffffffffffff) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r19, r17, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r20 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000000c0)={r17, r20, r21}, 0xc) r22 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r22, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r22, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r24 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0xfc55, r7, r14, r15, r21, 0x80, 0x4}, 0x80000001, 0x7, 0x3f, 0x7, r23, r24, 0xff}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r25 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r1) r26 = add_key$keyring(&(0x7f0000000100)='ke\x89ring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r25) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, r26) 04:25:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)=""/121, 0x79}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)=""/180, 0xb4}, {0x0}], 0x2}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xd051, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) ppoll(&(0x7f0000000600)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 04:25:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x6c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xd3, 0x0) 04:25:03 executing program 4: r0 = open(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000280), 0x4) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) dup(r1) 04:25:03 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000001200)='/dev/vcsa#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 04:25:03 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 04:25:03 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = getpgrp(0xffffffffffffffff) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r6, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={r4, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r10 = getpgrp(0xffffffffffffffff) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r12, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r13 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={r10, r13, r14}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r16 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r16, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r17 = getpgrp(0xffffffffffffffff) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r19, r17, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r20 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000000c0)={r17, r20, r21}, 0xc) r22 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r22, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r22, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r24 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0xfc55, r7, r14, r15, r21, 0x80, 0x4}, 0x80000001, 0x7, 0x3f, 0x7, r23, r24, 0xff}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r25 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r1) r26 = add_key$keyring(&(0x7f0000000100)='ke\x89ring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r25) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, r26) [ 2980.853245][ T27] kauditd_printk_skb: 140 callbacks suppressed [ 2980.853261][ T27] audit: type=1400 audit(1576383903.745:84748): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2981.038016][ T27] audit: type=1400 audit(1576383903.794:84749): avc: denied { map } for pid=11653 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:04 executing program 5: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = getpgrp(0xffffffffffffffff) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r6, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={r4, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r10 = getpgrp(0xffffffffffffffff) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r12, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r13 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={r10, r13, r14}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r16 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r16, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r17 = getpgrp(0xffffffffffffffff) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r19, r17, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r20 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000000c0)={r17, r20, r21}, 0xc) r22 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r22, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r22, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r24 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0xfc55, r7, r14, r15, r21, 0x80, 0x4}, 0x80000001, 0x7, 0x3f, 0x7, r23, r24, 0xff}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r25 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r1) r26 = add_key$keyring(&(0x7f0000000100)='ke\x89ring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r25) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, r26) [ 2981.179259][ T27] audit: type=1400 audit(1576383903.794:84750): avc: denied { map } for pid=11653 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2981.334516][ T27] audit: type=1400 audit(1576383903.794:84751): avc: denied { map } for pid=11653 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2981.494219][ T27] audit: type=1400 audit(1576383903.854:84752): avc: denied { map } for pid=11653 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:04 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x7530}, 0x10) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20008018, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000280)=ANY=[@ANYPTR64], 0x8) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fc000000) [ 2981.723695][ T27] audit: type=1400 audit(1576383903.854:84753): avc: denied { map } for pid=11677 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2981.902846][ T27] audit: type=1400 audit(1576383903.854:84754): avc: denied { map } for pid=11677 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup(0xffffffffffffffff) ioctl$TIOCSBRK(r0, 0x5427) 04:25:05 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x1ffb, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x201, 0x0) [ 2982.113563][ T27] audit: type=1400 audit(1576383903.883:84755): avc: denied { map } for pid=11653 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2982.285051][ T27] audit: type=1400 audit(1576383903.883:84756): avc: denied { map } for pid=11677 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2982.469053][ T27] audit: type=1400 audit(1576383903.913:84757): avc: denied { map } for pid=11677 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x7, 0x1, 0x3, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000140)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)}, 0x20) 04:25:05 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = getpgrp(0xffffffffffffffff) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r6, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={r4, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r10 = getpgrp(0xffffffffffffffff) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r12, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r13 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={r10, r13, r14}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r16 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r16, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r17 = getpgrp(0xffffffffffffffff) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r19, r17, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r20 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000000c0)={r17, r20, r21}, 0xc) r22 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r22, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r22, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r24 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0xfc55, r7, r14, r15, r21, 0x80, 0x4}, 0x80000001, 0x7, 0x3f, 0x7, r23, r24, 0xff}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r25 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r1) r26 = add_key$keyring(&(0x7f0000000100)='ke\x89ring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r25) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, r26) 04:25:06 executing program 5: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = getpgrp(0xffffffffffffffff) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r6, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={r4, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r10 = getpgrp(0xffffffffffffffff) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r12, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r13 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={r10, r13, r14}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r16 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r16, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r17 = getpgrp(0xffffffffffffffff) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r19, r17, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r20 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000000c0)={r17, r20, r21}, 0xc) r22 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r22, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r22, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r24 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0xfc55, r7, r14, r15, r21, 0x80, 0x4}, 0x80000001, 0x7, 0x3f, 0x7, r23, r24, 0xff}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r25 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r1) r26 = add_key$keyring(&(0x7f0000000100)='ke\x89ring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r25) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, r26) 04:25:06 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:25:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fallocate(r0, 0x4, 0x8, 0x4) r1 = syz_open_procfs(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[]}, 0x1, 0x0, 0x0, 0x8050}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x10}, 0x8000000200036158, 0x800007b, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x818f492baf681a2c) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) write$binfmt_aout(r2, &(0x7f00000003c0)={{0x108, 0x4, 0x3f, 0xe2, 0x2fd, 0x0, 0x206, 0xb18}, "", [[]]}, 0x120) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:25:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x50000}]}) r0 = dup(0xffffffffffffffff) setsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, 0x0) 04:25:08 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x10, @broadcast}]}}}]}, 0x38}}, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r3, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x43f) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f0000000140)) accept4$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x80800) ioctl$sock_SIOCETHTOOL(r0, 0x89f2, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[@ANYRESOCT=r1]}) 04:25:08 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = getpgrp(0xffffffffffffffff) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r6, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={r4, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r10 = getpgrp(0xffffffffffffffff) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r12, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r13 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={r10, r13, r14}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r16 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r16, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r17 = getpgrp(0xffffffffffffffff) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r19, r17, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r20 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000000c0)={r17, r20, r21}, 0xc) r22 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r22, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r22, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r24 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0xfc55, r7, r14, r15, r21, 0x80, 0x4}, 0x80000001, 0x7, 0x3f, 0x7, r23, r24, 0xff}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r25 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r1) r26 = add_key$keyring(&(0x7f0000000100)='ke\x89ring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r25) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, r26) 04:25:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x3) read(r0, &(0x7f0000000040)=""/11, 0xb) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETA(r2, 0x5404, &(0x7f00000000c0)) [ 2985.913792][ T27] kauditd_printk_skb: 159 callbacks suppressed [ 2985.913807][ T27] audit: type=1400 audit(1576383908.763:84917): avc: denied { map } for pid=12923 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:08 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd08283856736a22) setuid(r4) 04:25:08 executing program 1: [ 2986.160508][ T27] audit: type=1400 audit(1576383908.763:84918): avc: denied { map } for pid=12923 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2986.321868][ T27] audit: type=1400 audit(1576383908.802:84919): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=1134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2986.397115][T13111] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 2986.473848][ T27] audit: type=1400 audit(1576383908.911:84920): avc: denied { map } for pid=12923 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2986.695244][ T27] audit: type=1400 audit(1576383908.931:84921): avc: denied { map } for pid=12923 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2986.912591][ T27] audit: type=1400 audit(1576383908.971:84922): avc: denied { map } for pid=13087 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2987.068141][ T27] audit: type=1400 audit(1576383908.991:84923): avc: denied { map } for pid=13087 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:09 executing program 1: [ 2987.259907][ T27] audit: type=1400 audit(1576383908.991:84924): avc: denied { map } for pid=13087 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:10 executing program 0: [ 2987.413390][ T27] audit: type=1400 audit(1576383908.991:84925): avc: denied { map } for pid=13087 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:10 executing program 4: 04:25:10 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = getpgrp(0xffffffffffffffff) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r6, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={r4, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r10 = getpgrp(0xffffffffffffffff) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r12, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r13 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={r10, r13, r14}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r16 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r16, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r17 = getpgrp(0xffffffffffffffff) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r19, r17, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r20 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000000c0)={r17, r20, r21}, 0xc) r22 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r22, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r22, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r24 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0xfc55, r7, r14, r15, r21, 0x80, 0x4}, 0x80000001, 0x7, 0x3f, 0x7, r23, r24, 0xff}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r25 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r1) add_key$keyring(&(0x7f0000000100)='ke\x89ring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r25) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2987.573639][ T27] audit: type=1400 audit(1576383909.080:84926): avc: denied { map } for pid=13087 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:10 executing program 5: 04:25:10 executing program 2: 04:25:10 executing program 1: 04:25:11 executing program 4: 04:25:11 executing program 0: 04:25:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = getpgrp(0xffffffffffffffff) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r6, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={r4, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r10 = getpgrp(0xffffffffffffffff) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r12, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r13 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={r10, r13, r14}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r16 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r16, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r17 = getpgrp(0xffffffffffffffff) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r19, r17, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r20 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000000c0)={r17, r20, r21}, 0xc) r22 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r22, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r22, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r24 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0xfc55, r7, r14, r15, r21, 0x80, 0x4}, 0x80000001, 0x7, 0x3f, 0x7, r23, r24, 0xff}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r25 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r1) add_key$keyring(&(0x7f0000000100)='ke\x89ring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r25) 04:25:11 executing program 2: 04:25:11 executing program 5: 04:25:12 executing program 1: 04:25:12 executing program 0: 04:25:12 executing program 4: 04:25:12 executing program 2: 04:25:12 executing program 5: 04:25:13 executing program 1: 04:25:13 executing program 0: 04:25:13 executing program 4: 04:25:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = getpgrp(0xffffffffffffffff) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r6, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={r4, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r10 = getpgrp(0xffffffffffffffff) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r12, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r13 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={r10, r13, r14}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r16 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r16, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r17 = getpgrp(0xffffffffffffffff) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r19, r17, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r20 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000000c0)={r17, r20, r21}, 0xc) r22 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r22, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r22, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r24 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0xfc55, r7, r14, r15, r21, 0x80, 0x4}, 0x80000001, 0x7, 0x3f, 0x7, r23, r24, 0xff}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r25 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r1) add_key$keyring(&(0x7f0000000100)='ke\x89ring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r25) 04:25:13 executing program 2: [ 2990.998370][ T27] kauditd_printk_skb: 161 callbacks suppressed [ 2990.998386][ T27] audit: type=1400 audit(1576383913.800:85088): avc: denied { map } for pid=13616 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:14 executing program 5: 04:25:14 executing program 1: [ 2991.287814][ T27] audit: type=1400 audit(1576383913.800:85089): avc: denied { map } for pid=13630 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2991.456790][ T27] audit: type=1400 audit(1576383913.800:85090): avc: denied { map } for pid=13630 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:14 executing program 4: 04:25:14 executing program 0: [ 2991.666300][ T27] audit: type=1400 audit(1576383913.820:85091): avc: denied { map } for pid=13632 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2991.807393][ T27] audit: type=1400 audit(1576383913.850:85092): avc: denied { map } for pid=13632 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:14 executing program 2: [ 2992.040476][ T27] audit: type=1400 audit(1576383913.850:85093): avc: denied { map } for pid=13632 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:15 executing program 5: [ 2992.206426][ T27] audit: type=1400 audit(1576383913.850:85094): avc: denied { map } for pid=13632 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2992.383476][ T27] audit: type=1400 audit(1576383913.860:85095): avc: denied { map } for pid=13616 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:15 executing program 1: [ 2992.566933][ T27] audit: type=1400 audit(1576383913.870:85096): avc: denied { map } for pid=13630 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:15 executing program 4: 04:25:15 executing program 0: [ 2992.767015][ T27] audit: type=1400 audit(1576383913.929:85097): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62840 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:25:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = getpgrp(0xffffffffffffffff) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r6, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={r4, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r10 = getpgrp(0xffffffffffffffff) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r12, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r13 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={r10, r13, r14}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r16 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r16, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r17 = getpgrp(0xffffffffffffffff) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r19, r17, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r20 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000000c0)={r17, r20, r21}, 0xc) r22 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r22, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r22, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r24 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0xfc55, r7, r14, r15, r21, 0x80, 0x4}, 0x80000001, 0x7, 0x3f, 0x7, r23, r24, 0xff}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r1) 04:25:15 executing program 2: 04:25:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20600) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r4}, 0x8) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x12, &(0x7f0000000340)='/dev/loop-cF\xf8\xebj\xa6#\x13\xa6\xf0\xde{\xbd\x12on\xbf ;\'\xe5'}, 0x9) 04:25:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) connect$netlink(0xffffffffffffffff, &(0x7f0000000b00)=@proc={0x10, 0x0, 0x25dfdbff, 0x1000000}, 0xfffffe60) geteuid() 04:25:16 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000014c0)={0x0, 0x2}) 04:25:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640)=0x3, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000031, 0x0) 04:25:16 executing program 2: perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000380)={{0x2, 0x0, @multicast1}, {0x0, @local}, 0x1c, {0x2, 0x0, @empty}, 'rose0\x00'}) 04:25:17 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = getpgrp(0xffffffffffffffff) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r6, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={r4, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r10 = getpgrp(0xffffffffffffffff) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r12, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r13 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={r10, r13, r14}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r16 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r16, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r17 = getpgrp(0xffffffffffffffff) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r19, r17, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r20 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000000c0)={r17, r20, r21}, 0xc) r22 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r22, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r22, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r24 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0xfc55, r7, r14, r15, r21, 0x80, 0x4}, 0x80000001, 0x7, 0x3f, 0x7, r23, r24, 0xff}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 04:25:17 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) 04:25:17 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8b, 0x40, 0xca}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 04:25:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@rand_addr="460d25a17a7602076308e529a3dbb3c0", 0x78}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0xfffffffffffffe9c}, {&(0x7f0000000140)=""/64, 0xfffffffffffffdbe}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:25:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = getpgrp(0xffffffffffffffff) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r6, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={r4, r7, r8}, 0xc) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r10 = getpgrp(0xffffffffffffffff) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r12, r10, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r13 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000000c0)={r10, r13, r14}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r16 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r16, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r17 = getpgrp(0xffffffffffffffff) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r19, r17, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r20 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000000c0)={r17, r20, r21}, 0xc) r22 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r22, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r22, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r24 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0xfc55, r7, r14, r15, r21, 0x80, 0x4}, 0x80000001, 0x7, 0x3f, 0x7, r23, r24, 0xff}) 04:25:18 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x0) [ 2996.079555][ T27] kauditd_printk_skb: 175 callbacks suppressed [ 2996.079569][ T27] audit: type=1400 audit(1576383918.848:85273): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2996.263562][ T27] audit: type=1400 audit(1576383918.848:85274): avc: denied { map } for pid=14248 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) 04:25:19 executing program 2: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005eed) fallocate(r0, 0x20, 0x2000, 0x108008000) [ 2996.434003][ T27] audit: type=1400 audit(1576383918.888:85275): avc: denied { map } for pid=14248 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000880)=[@mask_fadd={0x58, 0x114, 0x9, {{}, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}}], 0x58}, 0x0) [ 2996.705939][ T27] audit: type=1400 audit(1576383918.967:85276): avc: denied { map } for pid=14248 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2996.860792][ T27] audit: type=1400 audit(1576383918.977:85277): avc: denied { map } for pid=14248 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) dup(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = getpgrp(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) syz_emit_ethernet(0x46, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6000000000102100fe800000000000000000000000000000fe8000000000000000000000000000aa00000000042a4978050087ae00ca8345"], 0x0) [ 2997.023198][ T27] audit: type=1400 audit(1576383919.047:85278): avc: denied { map } for pid=14248 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2997.171996][ T27] audit: type=1400 audit(1576383919.056:85279): avc: denied { map } for pid=14248 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2997.359345][ T27] audit: type=1400 audit(1576383919.126:85280): avc: denied { map } for pid=14328 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2997.501060][ T27] audit: type=1400 audit(1576383919.156:85281): avc: denied { map } for pid=14328 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) [ 2997.630512][ T27] audit: type=1400 audit(1576383919.156:85282): avc: denied { map } for pid=14328 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2997.713888][T14622] atomic_op 00000000cf4d07e2 conn xmit_atomic 000000000daf12bb 04:25:20 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r15 = getpgrp(0xffffffffffffffff) r16 = inotify_init1(0x0) fcntl$setown(r16, 0x8, 0xffffffffffffffff) fcntl$getownex(r16, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r17, r15, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r18 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000000c0)={r15, r18, r19}, 0xc) r20 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r20, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r20, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getpgrp(0xffffffffffffffff) 04:25:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x01a\x00\x80'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xb779ef21efb66f11}) 04:25:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="4c0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x4c}}, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x492492492492805, 0x0) 04:25:21 executing program 4: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$apparmor_current(r1, &(0x7f0000000800)=ANY=[@ANYRES64, @ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB="a8d64f35f3e513fb4daa5d51f0c235830b3d"], 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, @perf_config_ext={0xfff, 0x7ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) openat(r0, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) pipe(&(0x7f0000000040)) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) symlinkat(&(0x7f0000000380)='./bus\x00', r4, &(0x7f0000000500)='./bus\x00') open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(r3, &(0x7f00000038c0)=ANY=[@ANYBLOB="c940c0a6883e"], 0x6) creat(&(0x7f0000000140)='./bus\x00', 0x0) pipe(0x0) socketpair(0x11, 0x2, 0xff, &(0x7f0000000540)) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(0xffffffffffffffff, 0x0, r5, 0x0, 0x19404, 0x0) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x9}, 0x2) 04:25:21 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x2) 04:25:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) [ 2998.841358][T14945] bridge0: port 4(team0) entered disabled state [ 2998.847997][T14945] bridge0: port 3(gretap0) entered disabled state [ 2998.854577][T14945] bridge0: port 2(bridge_slave_1) entered disabled state [ 2998.862177][T14945] bridge0: port 1(bridge_slave_0) entered disabled state 04:25:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) 04:25:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r15 = getpgrp(0xffffffffffffffff) r16 = inotify_init1(0x0) fcntl$setown(r16, 0x8, 0xffffffffffffffff) fcntl$getownex(r16, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r17, r15, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r18 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000000c0)={r15, r18, r19}, 0xc) r20 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r20, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r20, 0x0, 0x100000000c9, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) 04:25:22 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 04:25:22 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x2) 04:25:22 executing program 0: 04:25:23 executing program 4: 04:25:23 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) 04:25:23 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) [ 3001.136441][ T27] kauditd_printk_skb: 135 callbacks suppressed [ 3001.136457][ T27] audit: type=1400 audit(1576383923.866:85418): avc: denied { map } for pid=15345 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:24 executing program 0: 04:25:24 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x2) 04:25:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r15 = getpgrp(0xffffffffffffffff) r16 = inotify_init1(0x0) fcntl$setown(r16, 0x8, 0xffffffffffffffff) fcntl$getownex(r16, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r17, r15, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r18 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000000c0)={r15, r18, r19}, 0xc) r20 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r20, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) setsockopt$inet_int(r20, 0x0, 0x100000000c9, 0x0, 0x0) [ 3001.458228][ T27] audit: type=1400 audit(1576383923.866:85419): avc: denied { map } for pid=15345 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3001.660392][ T27] audit: type=1400 audit(1576383923.896:85420): avc: denied { map } for pid=15376 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3001.830563][ T27] audit: type=1400 audit(1576383923.906:85421): avc: denied { map } for pid=15376 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3002.014828][ T27] audit: type=1400 audit(1576383923.926:85422): avc: denied { map } for pid=15376 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:24 executing program 4: [ 3002.154408][ T27] audit: type=1400 audit(1576383923.926:85423): avc: denied { map } for pid=15376 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:24 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) [ 3002.268260][ T27] audit: type=1400 audit(1576383923.926:85424): avc: denied { map } for pid=15372 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:25 executing program 0: [ 3002.456073][ T27] audit: type=1400 audit(1576383923.985:85425): avc: denied { map } for pid=15372 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x2) [ 3002.608394][ T27] audit: type=1400 audit(1576383923.985:85426): avc: denied { map } for pid=15372 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r15 = getpgrp(0xffffffffffffffff) r16 = inotify_init1(0x0) fcntl$setown(r16, 0x8, 0xffffffffffffffff) fcntl$getownex(r16, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r17, r15, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r18 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000000c0)={r15, r18, r19}, 0xc) r20 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r20, 0x0, 0x80000000000c8, &(0x7f00000000c0), 0x4) [ 3002.804803][ T27] audit: type=1400 audit(1576383924.035:85427): avc: denied { map } for pid=15376 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:25 executing program 4: 04:25:26 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 04:25:26 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) 04:25:26 executing program 0: 04:25:26 executing program 1: ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x2) 04:25:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r15 = getpgrp(0xffffffffffffffff) r16 = inotify_init1(0x0) fcntl$setown(r16, 0x8, 0xffffffffffffffff) fcntl$getownex(r16, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r17, r15, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r18 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000000c0)={r15, r18, r19}, 0xc) socket$inet(0x2, 0x3, 0x80000000002) 04:25:26 executing program 4: 04:25:27 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) 04:25:27 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 04:25:27 executing program 1: ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x2) 04:25:27 executing program 0: 04:25:27 executing program 4: 04:25:27 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r15 = getpgrp(0xffffffffffffffff) r16 = inotify_init1(0x0) fcntl$setown(r16, 0x8, 0xffffffffffffffff) fcntl$getownex(r16, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r17, r15, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r18 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000000c0)={r15, r18, r19}, 0xc) 04:25:28 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) 04:25:28 executing program 1: ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x2) 04:25:28 executing program 2: ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9201, 0x0) 04:25:28 executing program 0: 04:25:28 executing program 4: [ 3006.208781][ T27] kauditd_printk_skb: 154 callbacks suppressed [ 3006.208794][ T27] audit: type=1400 audit(1576383928.894:85582): avc: denied { map } for pid=15527 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:29 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) 04:25:29 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x2) 04:25:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r15 = getpgrp(0xffffffffffffffff) r16 = inotify_init1(0x0) fcntl$setown(r16, 0x8, 0xffffffffffffffff) fcntl$getownex(r16, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r17, r15, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) [ 3006.440276][ T27] audit: type=1400 audit(1576383928.973:85583): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62840 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:25:29 executing program 2: ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9201, 0x0) [ 3006.600567][ T27] audit: type=1400 audit(1576383928.983:85584): avc: denied { map } for pid=15534 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:29 executing program 0: [ 3006.740538][ T27] audit: type=1400 audit(1576383929.003:85585): avc: denied { map } for pid=15534 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3006.943019][ T27] audit: type=1400 audit(1576383929.043:85586): avc: denied { map } for pid=15534 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3007.094304][ T27] audit: type=1400 audit(1576383929.043:85587): avc: denied { map } for pid=15534 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3007.274914][ T27] audit: type=1400 audit(1576383929.043:85588): avc: denied { map } for pid=15535 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:30 executing program 4: 04:25:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) 04:25:30 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x2) [ 3007.421477][ T27] audit: type=1400 audit(1576383929.053:85589): avc: denied { map } for pid=15535 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3007.561576][ T27] audit: type=1400 audit(1576383929.083:85590): avc: denied { map } for pid=15535 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:30 executing program 0: [ 3007.722203][ T27] audit: type=1400 audit(1576383929.102:85591): avc: denied { map } for pid=15535 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:30 executing program 2: ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9201, 0x0) 04:25:31 executing program 4: 04:25:31 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x2) 04:25:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r15 = getpgrp(0xffffffffffffffff) r16 = inotify_init1(0x0) fcntl$setown(r16, 0x8, 0xffffffffffffffff) fcntl$getownex(r16, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r17, r15, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 04:25:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) 04:25:31 executing program 0: 04:25:31 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 04:25:31 executing program 1: syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x2) 04:25:32 executing program 4: 04:25:32 executing program 0: 04:25:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) 04:25:32 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r15 = getpgrp(0xffffffffffffffff) r16 = inotify_init1(0x0) fcntl$setown(r16, 0x8, 0xffffffffffffffff) fcntl$getownex(r16, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r17, r15, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) geteuid() 04:25:32 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 04:25:33 executing program 4: 04:25:33 executing program 0: 04:25:33 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 04:25:33 executing program 1: syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x2) 04:25:33 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r15 = getpgrp(0xffffffffffffffff) r16 = inotify_init1(0x0) fcntl$setown(r16, 0x8, 0xffffffffffffffff) fcntl$getownex(r16, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r17, r15, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:25:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) 04:25:34 executing program 4: [ 3011.508633][ T27] kauditd_printk_skb: 171 callbacks suppressed [ 3011.508648][ T27] audit: type=1400 audit(1576383934.140:85763): avc: denied { map } for pid=15892 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3011.663033][ T27] audit: type=1400 audit(1576383934.229:85764): avc: denied { map } for pid=15892 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:34 executing program 0: [ 3011.835957][ T27] audit: type=1400 audit(1576383934.249:85765): avc: denied { map } for pid=15892 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3012.000917][ T27] audit: type=1400 audit(1576383934.249:85766): avc: denied { map } for pid=15892 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:34 executing program 2: syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9201, 0x0) [ 3012.175263][ T27] audit: type=1400 audit(1576383934.368:85767): avc: denied { map } for pid=15892 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:34 executing program 1: syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0x2) [ 3012.294161][ T27] audit: type=1400 audit(1576383934.368:85768): avc: denied { watch } for pid=11812 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3012.466719][ T27] audit: type=1400 audit(1576383934.438:85769): avc: denied { watch } for pid=11720 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=1135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:25:35 executing program 4: 04:25:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) [ 3012.706540][ T27] audit: type=1400 audit(1576383934.467:85770): avc: denied { map } for pid=15892 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:35 executing program 0: [ 3012.884947][ T27] audit: type=1400 audit(1576383934.507:85771): avc: denied { map } for pid=15892 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3013.044023][ T27] audit: type=1400 audit(1576383934.557:85772): avc: denied { map } for pid=15894 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:35 executing program 2: syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9201, 0x0) 04:25:36 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) 04:25:36 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r15 = getpgrp(0xffffffffffffffff) r16 = inotify_init1(0x0) fcntl$setown(r16, 0x8, 0xffffffffffffffff) fcntl$getownex(r16, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r17, r15, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:25:36 executing program 4: 04:25:36 executing program 0: 04:25:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0xc0) 04:25:37 executing program 1: 04:25:37 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) getpgrp(0xffffffffffffffff) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)) 04:25:37 executing program 4: 04:25:37 executing program 0: 04:25:37 executing program 2: syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9201, 0x0) 04:25:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0xc0) 04:25:38 executing program 1: 04:25:38 executing program 4: 04:25:38 executing program 0: 04:25:38 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) getpgrp(0xffffffffffffffff) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) 04:25:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0xc0) [ 3016.581316][ T27] kauditd_printk_skb: 148 callbacks suppressed [ 3016.581330][ T27] audit: type=1400 audit(1576383939.178:85921): avc: denied { map } for pid=16252 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3016.775039][ T27] audit: type=1400 audit(1576383939.188:85922): avc: denied { map } for pid=16252 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:39 executing program 1: 04:25:39 executing program 4: [ 3016.926317][ T27] audit: type=1400 audit(1576383939.277:85923): avc: denied { map } for pid=16252 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:39 executing program 0: [ 3017.117972][ T27] audit: type=1400 audit(1576383939.277:85924): avc: denied { map } for pid=16265 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:39 executing program 2: [ 3017.266111][ T27] audit: type=1400 audit(1576383939.277:85925): avc: denied { map } for pid=16265 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3017.409950][ T27] audit: type=1400 audit(1576383939.297:85926): avc: denied { map } for pid=16265 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3017.596293][ T27] audit: type=1400 audit(1576383939.297:85927): avc: denied { map } for pid=16265 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:40 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) getpgrp(0xffffffffffffffff) inotify_init1(0x0) [ 3017.772911][ T27] audit: type=1400 audit(1576383939.337:85928): avc: denied { map } for pid=16252 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0xc0) [ 3017.965462][ T27] audit: type=1400 audit(1576383939.357:85929): avc: denied { map } for pid=16252 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:40 executing program 4: 04:25:40 executing program 0: [ 3018.159694][ T27] audit: type=1400 audit(1576383939.406:85930): avc: denied { map } for pid=16265 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:40 executing program 2: 04:25:40 executing program 1: 04:25:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) 04:25:41 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) getpgrp(0xffffffffffffffff) 04:25:41 executing program 0: 04:25:41 executing program 4: 04:25:41 executing program 1: 04:25:42 executing program 2: 04:25:42 executing program 0: 04:25:42 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) 04:25:42 executing program 1: 04:25:42 executing program 4: 04:25:43 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000001c0)=""/113) 04:25:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) 04:25:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r2, &(0x7f00000014c0), 0x450) 04:25:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCG_STATS(r1, 0xc0109207, &(0x7f0000000100)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) 04:25:44 executing program 1: ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDCTL_DSP_STEREO(0xffffffffffffffff, 0xc0045003, 0x0) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) 04:25:44 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) socket$inet6(0xa, 0x2, 0x0) [ 3021.679280][ T27] kauditd_printk_skb: 157 callbacks suppressed [ 3021.679294][ T27] audit: type=1400 audit(1576383944.236:86088): avc: denied { map } for pid=16402 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3021.858024][ T27] audit: type=1400 audit(1576383944.285:86089): avc: denied { map } for pid=16402 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3022.044860][ T27] audit: type=1400 audit(1576383944.285:86090): avc: denied { map } for pid=16402 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:44 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x77359400}}, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40085400, 0x4001bf) [ 3022.177831][ T27] audit: type=1400 audit(1576383944.285:86091): avc: denied { map } for pid=16402 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3022.332548][ T27] audit: type=1400 audit(1576383944.345:86092): avc: denied { map } for pid=16402 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3022.470275][ T27] audit: type=1400 audit(1576383944.404:86093): avc: denied { map } for pid=16402 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) [ 3022.642673][ T27] audit: type=1400 audit(1576383944.404:86094): avc: denied { map } for pid=16402 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3022.796668][ T27] audit: type=1400 audit(1576383944.454:86095): avc: denied { watch } for pid=11812 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=1135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:25:45 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) [ 3022.951228][ T27] audit: type=1400 audit(1576383944.503:86096): avc: denied { map } for pid=16402 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:45 executing program 0: 04:25:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@ipv4, 0x69}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/65, 0x21}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 3023.169221][ T27] audit: type=1400 audit(1576383944.563:86097): avc: denied { map } for pid=16402 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:46 executing program 1: r0 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x16) 04:25:46 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 04:25:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r3, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 04:25:46 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r12 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r12, r13}, 0xc) 04:25:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)=""/98, 0x62}], 0x1}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = dup(r1) shutdown(0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/185, 0xb9}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x2d, 0x0, 0x0, 0x800e004ae) shutdown(r4, 0x0) shutdown(r2, 0x0) 04:25:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x50, &(0x7f00000000c0)={0x0, {{0x10, 0x2}}}, 0x90) recvfrom$inet(r0, 0x0, 0x24f, 0x0, 0x0, 0x800e003f0) shutdown(r0, 0x0) 04:25:48 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 04:25:48 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x7, 0x209e20, 0x8000000001}, 0x414) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xae5c7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77f7fb, 0x0, 0x82e700, 0x0, 0x0, [0xffffffffa0018000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x2c) sendmsg(0xffffffffffffffff, 0x0, 0x20004004) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:25:48 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xa}, @dev}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 04:25:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone3(&(0x7f0000003740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003700)=[0xffffffffffffffff], 0x1}, 0x50) 04:25:48 executing program 0: r0 = socket$packet(0x11, 0x2000100000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x7f}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f00000002c0)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto(r1, &(0x7f0000000280)="f3899bb430e3f75a291718ec00", 0xffffffffffffff48, 0x10100, 0x0, 0x15c) 04:25:48 executing program 5: unshare(0x20600) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 04:25:49 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) geteuid() [ 3026.737969][ T27] kauditd_printk_skb: 155 callbacks suppressed [ 3026.737982][ T27] audit: type=1400 audit(1576383949.254:86253): avc: denied { map } for pid=17583 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000002, &(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff7f, 0x8000204087ffd, 0x0, 0x138) ppoll(&(0x7f0000000540)=[{r0}], 0x1, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffffda, 0x10120, 0x0, 0xffffffffffffff73) [ 3026.913670][ T27] audit: type=1400 audit(1576383949.254:86254): avc: denied { map } for pid=17583 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3027.162012][ T27] audit: type=1400 audit(1576383949.254:86255): avc: denied { map } for pid=17564 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3027.372573][ T27] audit: type=1400 audit(1576383949.254:86256): avc: denied { map } for pid=17564 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3027.570366][ T27] audit: type=1400 audit(1576383949.293:86257): avc: denied { map } for pid=17592 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3027.675183][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3027.681119][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3027.687052][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3027.692871][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:25:50 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000001cc0), 0x0, &(0x7f0000002800)=""/54, 0x36}, 0x7}, {{&(0x7f0000002100)=@ax25={{0x3, @bcast}, [@remote, @default, @bcast, @rose, @default, @rose, @remote, @rose]}, 0x80, &(0x7f0000002440)=[{&(0x7f0000002180)=""/254, 0xfe}, {&(0x7f0000002340)=""/219, 0xdb}], 0x2, &(0x7f0000002480)=""/184, 0xb8}, 0x2}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f0000000180)='./bus\x00', 0x141842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) [ 3027.802225][ T27] audit: type=1400 audit(1576383949.313:86258): avc: denied { map } for pid=17583 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:50 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r9 = getpgrp(0xffffffffffffffff) r10 = inotify_init1(0x0) fcntl$setown(r10, 0x8, 0xffffffffffffffff) fcntl$getownex(r10, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r11, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) [ 3027.959440][ T27] audit: type=1400 audit(1576383949.373:86259): avc: denied { map } for pid=17592 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000001cc0), 0x0, &(0x7f0000002800)=""/54, 0x36}, 0x7}, {{&(0x7f0000002100)=@ax25={{0x3, @bcast}, [@remote, @default, @bcast, @rose, @default, @rose, @remote, @rose]}, 0x80, &(0x7f0000002440)=[{&(0x7f0000002180)=""/254, 0xfe}, {&(0x7f0000002340)=""/219, 0xdb}], 0x2, &(0x7f0000002480)=""/184, 0xb8}, 0x2}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x800000, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) 04:25:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000001cc0), 0x0, &(0x7f0000002800)=""/54, 0x36}, 0x7}, {{&(0x7f0000002100)=@ax25={{0x3, @bcast}, [@remote, @default, @bcast, @rose, @default, @rose, @remote, @rose]}, 0x80, &(0x7f0000002440)=[{&(0x7f0000002340)=""/219, 0xdb}], 0x1, &(0x7f0000002480)=""/184, 0xb8}, 0x2}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f0000000180)='./bus\x00', 0x141842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) [ 3028.104101][ T27] audit: type=1400 audit(1576383949.373:86260): avc: denied { map } for pid=17592 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3028.276380][ T27] audit: type=1400 audit(1576383949.373:86261): avc: denied { map } for pid=17592 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3028.411231][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3028.417073][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3028.494976][ T27] audit: type=1400 audit(1576383949.393:86262): avc: denied { map } for pid=17583 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3028.643146][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3028.648985][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:25:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e270900000000000000ff00000000a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 04:25:51 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) 04:25:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1000000000000006, 0x101102) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaa5f}, 0x204, 0x0, 0x0, 0x5, 0x40000000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000a80), 0x0) r5 = socket(0x0, 0x0, 0x93) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$netlink(r6, &(0x7f0000000b00)=@proc={0x10, 0x0, 0x25dfdbff, 0x1000000}, 0xfffffe60) getegid() getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000380)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) geteuid() lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r7) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x12001, 0x0) 04:25:51 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) getpgrp(0xffffffffffffffff) r9 = inotify_init1(0x0) fcntl$setown(r9, 0x8, 0xffffffffffffffff) fcntl$getownex(r9, 0x10, &(0x7f0000000080)) 04:25:51 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sync_file_range(r1, 0x4, 0x6, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000740)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="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"], 0xfc7c) fallocate(r3, 0x8, 0x0, 0x8000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000180), 0x8) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) 04:25:52 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(&(0x7f0000000380)) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000740)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="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"], 0xfc7c) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) fallocate(r1, 0x8, 0x0, 0x8000) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000004540)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) 04:25:52 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000080000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 04:25:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) getpgrp(0xffffffffffffffff) r9 = inotify_init1(0x0) fcntl$setown(r9, 0x8, 0xffffffffffffffff) 04:25:52 executing program 5: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff83, 0xa}}}}}, 0x0) 04:25:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) 04:25:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/568]}, 0x2b0) 04:25:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) getpgrp(0xffffffffffffffff) r9 = inotify_init1(0x0) fcntl$setown(r9, 0x8, 0xffffffffffffffff) 04:25:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1002007ffff007) [ 3031.856353][ T27] kauditd_printk_skb: 150 callbacks suppressed [ 3031.856368][ T27] audit: type=1400 audit(1576383954.321:86413): avc: denied { watch } for pid=11720 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=1135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3032.134491][ T27] audit: type=1400 audit(1576383954.579:86414): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:25:54 executing program 4: syz_open_procfs(0x0, &(0x7f00000002c0)='mountstats\x00') [ 3032.544655][ T27] audit: type=1400 audit(1576383955.006:86415): avc: denied { map } for pid=19074 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:55 executing program 1: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f000000cd40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005a80)=[{&(0x7f0000003640)=""/106, 0x6a}, {&(0x7f0000000100)=""/63, 0x3f}], 0x2}}], 0x2, 0x0, 0x0) 04:25:55 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x4000000000002, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, 0x0) [ 3032.716965][ T27] audit: type=1400 audit(1576383955.065:86416): avc: denied { map } for pid=19074 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3032.874755][ T27] audit: type=1400 audit(1576383955.065:86417): avc: denied { map } for pid=19074 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3033.059867][ T27] audit: type=1400 audit(1576383955.065:86418): avc: denied { map } for pid=19074 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3033.293096][ T27] audit: type=1400 audit(1576383955.135:86419): avc: denied { map } for pid=19074 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:55 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) getpgrp(0xffffffffffffffff) inotify_init1(0x0) [ 3033.517551][ T27] audit: type=1400 audit(1576383955.174:86420): avc: denied { map } for pid=19074 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3033.670589][ T27] audit: type=1400 audit(1576383955.174:86421): avc: denied { map } for pid=19074 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:56 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000200)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0xe4c}}, 0x0) rt_sigtimedwait(&(0x7f0000000040)={0x81}, 0x0, 0x0, 0x8) [ 3033.845495][ T27] audit: type=1400 audit(1576383955.204:86422): avc: denied { map } for pid=19076 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:25:56 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:25:57 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f0000000000)=0x6, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 04:25:57 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) getpgrp(0xffffffffffffffff) 04:25:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0xfffffffffffffffb, 0x0) 04:25:57 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f00000000c0), 0x0}, 0x20) 04:25:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x1, 0x0, 0x0, 0x3, 0x0, 0x8}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r2, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0xfffffd89}], 0x1}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600), 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, 0xffffffffffffffff) creat(0x0, 0x0) creat(0x0, 0x0) io_setup(0x8, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x400080, 0x0) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x80000, 0x1f) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x836a, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x4000000000000002) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 04:25:58 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) 04:25:58 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:25:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x4000000000002, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 04:25:59 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 04:25:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x300500, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x0) 04:25:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000300)='/dev/capi20\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x0) [ 3036.943297][ T27] kauditd_printk_skb: 156 callbacks suppressed [ 3036.943317][ T27] audit: type=1400 audit(1576383959.369:86579): avc: denied { map } for pid=19978 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3037.184041][ T27] audit: type=1400 audit(1576383959.419:86580): avc: denied { map } for pid=19964 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3037.375652][ T27] audit: type=1400 audit(1576383959.419:86581): avc: denied { map } for pid=19964 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3037.556870][ T27] audit: type=1400 audit(1576383959.419:86582): avc: denied { map } for pid=19978 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3037.741266][ T27] audit: type=1400 audit(1576383959.438:86583): avc: denied { map } for pid=20019 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3037.906914][ T27] audit: type=1400 audit(1576383959.438:86584): avc: denied { map } for pid=20019 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:00 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:00 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xffff, r1}) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x215, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r2, r3, 0x0, 0x80000003) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000003c0)={0x0, 0x0}) prlimit64(r4, 0xc, &(0x7f0000000280)={0xffffffff, 0x8d}, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) r9 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r9, &(0x7f00000001c0)=""/121, 0x79) getdents(r9, &(0x7f0000000000)=""/46, 0x15092e2a1832a052) write$ppp(r9, &(0x7f00000002c0)="03c2cc8c4f31b6753d4ec731c64945e0246542ab60f20678de1f60aadcfe86038cf01cab8c10bc3210758578bf31eeecfdbd03a8773136a4ebb22452c195a3df8b986a2b120238598748584f649ffe7dab4e48aff95cfa133be092ee2353f6ce4c8afb5a78ac864e9b6ae1f4e17e6bbce5df4317e42b27e467687d3e3e2878cb8795af3120e4ef05598ca335880611775b636aa885f37d049c4efdddc1b2730eef3a0616a6e8ece67db69eef73915a9efcb415d55138d769b01e313be76bd08382683f6405354943c224bcb5b8333e7b54b8", 0xd2) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0xfffffffffffffffc}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x14001, 0x0) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/121, 0x79) getdents(0xffffffffffffffff, &(0x7f0000000000)=""/46, 0x15092e2a1832a052) r10 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003f00)=[{{&(0x7f0000000500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000580)=""/191, 0xbf}, {&(0x7f0000000640)=""/104, 0x68}, {&(0x7f0000000880)=""/200, 0xc8}], 0x3}, 0x400}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a80)=""/227, 0xe3}], 0x1, &(0x7f0000000e00)=""/185, 0xb9}, 0x1}, {{&(0x7f0000000bc0)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/43, 0x2b}, {&(0x7f0000000f00)=""/250, 0xfa}, {&(0x7f0000001000)}], 0x3, &(0x7f0000001080)=""/179, 0xb3}, 0xee}, {{&(0x7f0000001140)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001480)=[{&(0x7f00000011c0)=""/231, 0xe7}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/134, 0x86}], 0x3, &(0x7f00000014c0)=""/83, 0x53}, 0x6}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/172, 0xac}, {&(0x7f0000002680)=""/221, 0xdd}, {&(0x7f0000002940)=""/4096, 0x1000}, {&(0x7f0000002780)=""/87, 0x57}], 0x4, &(0x7f0000002800)=""/6, 0x6}}, {{&(0x7f0000002840)=@tipc, 0x80, &(0x7f0000003e40)=[{&(0x7f0000003a40)=""/188, 0xbc}, {0x0}, {&(0x7f0000003b40)=""/223, 0xdf}, {&(0x7f0000003c40)=""/149, 0x95}, {&(0x7f0000003d00)=""/49, 0x31}, {&(0x7f0000003d40)=""/211, 0xd3}], 0x6}, 0x49}], 0x318, 0x2, &(0x7f0000004080)) r12 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r12, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback, r11}, 0xc) ioctl$sock_inet6_SIOCSIFADDR(r10, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe, r11}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r10, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x42, r13}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r14, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x420000a77, 0x0) [ 3038.061567][ T27] audit: type=1400 audit(1576383959.448:86585): avc: denied { map } for pid=19978 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:00 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) [ 3038.199633][ T27] audit: type=1400 audit(1576383959.458:86586): avc: denied { map } for pid=20019 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3038.231990][T11807] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3038.245025][T20232] audit: audit_backlog=65 > audit_backlog_limit=64 04:26:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(r1, 0x0, r0) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e00842) 04:26:01 executing program 1: poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xa4d, 0x0, 0x0, 0x800e003d6) poll(0x0, 0x0, 0x10001) shutdown(r0, 0x0) 04:26:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8d}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x50, 0x4, 0x40000000000008, 0x319, 0x0, 0x0, {}, [@typed={0x8, 0x2, @pid}, @typed={0x34, 0x3, @str='keyringeth0vmnet1cgroupppp1[eth0vboxnet1user\x00'}]}, 0x50}}, 0x0) recvmmsg(r0, &(0x7f0000001340)=[{{&(0x7f00000002c0)=@xdp, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000340)=""/254, 0xfe}, {&(0x7f0000000440)=""/63, 0x3f}, {&(0x7f0000000480)=""/25, 0x19}, {&(0x7f0000000500)=""/183, 0xb7}, {&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000680)=""/90, 0x5a}, {&(0x7f0000000700)=""/183, 0xb7}], 0x7, &(0x7f0000000840)=""/64, 0x40}, 0x5}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000000980)=""/97, 0x61}], 0x2, &(0x7f0000000a40)=""/54, 0x36}, 0x9}, {{&(0x7f0000000a80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000b00)=""/35, 0x23}], 0x1, &(0x7f0000000b80)=""/61, 0x3d}, 0xde7f}, {{&(0x7f0000000bc0)=@hci, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/25, 0x19}, {&(0x7f0000000c80)=""/126, 0x7e}, {&(0x7f0000000d00)=""/101, 0x65}, {&(0x7f0000000d80)=""/119, 0x77}], 0x4, &(0x7f0000000e40)}, 0x100}, {{&(0x7f0000000e80)=@in, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000f00)=""/127, 0x7f}], 0x1, &(0x7f0000000fc0)=""/251, 0xfb}, 0x8000}, {{&(0x7f00000010c0)=@pppol2tpv3, 0x80, &(0x7f00000012c0)=[{&(0x7f0000001140)=""/76, 0x4c}, {&(0x7f00000011c0)=""/129, 0x81}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000001280)=""/23, 0x17}], 0x4, &(0x7f0000001300)=""/50, 0x32}, 0x7f2}], 0x6, 0x40, &(0x7f00000014c0)={0x77359400}) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000001500)={0xe1, 0xfffffffa, 0x2}, 0xc) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f00000004c0)) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000001540)=""/205) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000100)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x80000000000000a, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r6, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) accept4$inet(r6, &(0x7f0000000180)={0x2, 0x0, @empty}, &(0x7f00000001c0)=0x10, 0x80000) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 04:26:01 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) socket$inet6(0xa, 0x2, 0x0) 04:26:02 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) [ 3040.011350][T20752] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3040.057978][T20752] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 04:26:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000001c0)=r3) read$rfkill(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x4d, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80, 0x1, @perf_bp={&(0x7f00000000c0), 0x5}, 0x8, 0x9, 0x1000, 0x2, 0x5c, 0x0, 0x40}, 0x0, 0x10, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000180)) fallocate(0xffffffffffffffff, 0x10, 0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000300)=[{0x81, 0x7, 0x7f, 0x0, @time={0x0, 0x989680}, {0x0, 0x5}, {0xd7, 0x4}, @connect={{0x6, 0x6}, {0x80}}}, {0x7, 0x7f, 0xb, 0x9, @tick=0xffffffff, {0x0, 0xc0}, {0x0, 0x78}, @control={0x1, 0x4640, 0x7c}}, {0x0, 0x14, 0x0, 0x0, @tick, {0x3f}, {0x1}, @note={0x7, 0x7, 0x0, 0xd4}}, {0x1, 0x0, 0x1, 0x2, @tick, {0x20}, {}, @result}, {0x6, 0x0, 0x6, 0x0, @time, {0x0, 0xde}, {0x3f}, @result={0x3}}, {0x0, 0x40, 0x46, 0x5, @time={0x77359400}, {0x8, 0x9}, {0x7f}, @connect={{0x7b}}}], 0x120) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r4 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) 04:26:02 executing program 1: r0 = memfd_create(&(0x7f0000000200)='eth0\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x2011, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe3, 0x0, &(0x7f0000000000)) 04:26:02 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r6 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={r3, r6, r7}, 0xc) 04:26:03 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg$inet(r1, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x4e1e, @initdev}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x18}}], 0x400000000000277, 0x0) 04:26:03 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000000, 0x0) 04:26:03 executing program 0: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0x5, 0x7895, 0x1, 0x101, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) r0 = memfd_create(&(0x7f0000000040)='$\xbbeth0nodev*\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='net/dev\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net\b\x00co\x00') 04:26:04 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 04:26:04 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x67faf42d5e4f3ace}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000001200)='/dev/vcsa#\x00', 0x1, 0x102) fcntl$setstatus(r2, 0x4, 0x2000) read$alg(r2, &(0x7f0000000000)=""/200, 0xc8) r3 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="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", 0xe00) sendfile(r4, r5, 0x0, 0x12000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f0000000200)={{0x1, 0x0, @identifier="11871125300886dbb40752969a589925"}}) socket$inet6(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x3f, &(0x7f0000000140), &(0x7f0000000180)=0x4) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x4) [ 3042.024298][ T27] kauditd_printk_skb: 215 callbacks suppressed [ 3042.024312][ T27] audit: type=1400 audit(1576383964.407:86795): avc: denied { map } for pid=21245 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:04 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xa4d, 0x0, 0x0, 0x800e003d6) poll(0x0, 0x0, 0x10001) shutdown(r0, 0x0) [ 3042.214711][ T27] audit: type=1400 audit(1576383964.437:86796): avc: denied { map } for pid=21245 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:04 executing program 4: [ 3042.381455][ T27] audit: type=1400 audit(1576383964.466:86797): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=1135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3042.547111][ T27] audit: type=1400 audit(1576383964.516:86798): avc: denied { create } for pid=21309 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3042.719343][ T27] audit: type=1400 audit(1576383964.516:86799): avc: denied { write } for pid=21309 comm="syz-executor.5" path="socket:[184368]" dev="sockfs" ino=184368 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:26:05 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000000, 0x0) [ 3042.902885][ T27] audit: type=1400 audit(1576383964.516:86800): avc: denied { map } for pid=21245 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:05 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) geteuid() [ 3043.103829][ T27] audit: type=1400 audit(1576383964.516:86801): avc: denied { map } for pid=21245 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3043.294550][ T27] audit: type=1400 audit(1576383964.595:86802): avc: denied { map } for pid=21245 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3043.462353][ T27] audit: type=1400 audit(1576383964.615:86804): avc: denied { map } for pid=21245 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3043.680547][ T27] audit: type=1400 audit(1576383964.595:86803): avc: denied { map } for pid=21386 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:06 executing program 0: 04:26:06 executing program 4: 04:26:06 executing program 1: r0 = socket(0x11, 0x2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00\x05H\xfeL\x19\x00\x00\nz\x03', 0xffb}) 04:26:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:07 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000000, 0x0) 04:26:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) close(r0) 04:26:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(0xffffffffffffffff) r2 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x69) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x5, 0x1, 0x0, [{}, {}]}]}}}], 0x20, 0x5}, 0x0) 04:26:07 executing program 2: 04:26:07 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) kcmp(0x0, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:08 executing program 2: 04:26:08 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:08 executing program 4: 04:26:08 executing program 1: 04:26:09 executing program 0: 04:26:09 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) kcmp(0x0, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:09 executing program 2: [ 3047.094548][ T27] kauditd_printk_skb: 147 callbacks suppressed [ 3047.094563][ T27] audit: type=1400 audit(1576383969.435:86952): avc: denied { watch } for pid=11810 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3047.328229][ T27] audit: type=1400 audit(1576383969.643:86953): avc: denied { map } for pid=22050 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3047.497428][ T27] audit: type=1400 audit(1576383969.712:86954): avc: denied { watch } for pid=11720 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=1135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:26:10 executing program 4: 04:26:10 executing program 1: [ 3047.742067][ T27] audit: type=1400 audit(1576383969.722:86955): avc: denied { map } for pid=22050 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3047.927920][ T27] audit: type=1400 audit(1576383969.722:86956): avc: denied { map } for pid=22050 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:10 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:10 executing program 0: [ 3048.165159][ T27] audit: type=1400 audit(1576383969.722:86957): avc: denied { map } for pid=22050 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3048.272030][T22058] audit: audit_backlog=65 > audit_backlog_limit=64 04:26:10 executing program 2: [ 3048.313597][T22059] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3048.321677][T22058] audit: audit_lost=686 audit_rate_limit=0 audit_backlog_limit=64 [ 3048.346654][ T27] audit: type=1400 audit(1576383969.762:86958): avc: denied { map } for pid=22050 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:10 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) kcmp(0x0, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:11 executing program 4: 04:26:11 executing program 1: 04:26:11 executing program 0: 04:26:11 executing program 2: 04:26:11 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:11 executing program 4: 04:26:12 executing program 0: 04:26:12 executing program 1: 04:26:12 executing program 2: 04:26:13 executing program 4: 04:26:13 executing program 1: 04:26:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:13 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:13 executing program 0: 04:26:13 executing program 2: 04:26:13 executing program 4: 04:26:14 executing program 1: 04:26:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:14 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:14 executing program 0: 04:26:14 executing program 2: [ 3052.144312][ T27] kauditd_printk_skb: 232 callbacks suppressed [ 3052.144327][ T27] audit: type=1400 audit(1576383974.443:87180): avc: denied { map } for pid=22094 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:14 executing program 4: [ 3052.329791][ T27] audit: type=1400 audit(1576383974.483:87181): avc: denied { map } for pid=22098 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3052.501797][ T27] audit: type=1400 audit(1576383974.423:87179): avc: denied { map } for pid=22096 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3052.707965][ T27] audit: type=1400 audit(1576383974.492:87182): avc: denied { map } for pid=22096 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3052.887716][ T27] audit: type=1400 audit(1576383974.502:87183): avc: denied { map } for pid=22094 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:15 executing program 2: 04:26:15 executing program 0: 04:26:15 executing program 1: [ 3053.065988][ T27] audit: type=1400 audit(1576383974.512:87184): avc: denied { map } for pid=22098 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3053.200219][ T27] audit: type=1400 audit(1576383974.512:87185): avc: denied { map } for pid=22098 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:15 executing program 4: 04:26:15 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r4, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) [ 3053.378574][ T27] audit: type=1400 audit(1576383974.532:87186): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3053.560095][ T27] audit: type=1400 audit(1576383974.572:87187): avc: denied { map } for pid=22096 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3053.721281][ T27] audit: type=1400 audit(1576383974.572:87188): avc: denied { map } for pid=22096 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:16 executing program 0: 04:26:16 executing program 2: 04:26:16 executing program 1: 04:26:16 executing program 4: 04:26:17 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r4, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:17 executing program 2: 04:26:17 executing program 1: 04:26:17 executing program 0: 04:26:17 executing program 4: 04:26:17 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r4, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:18 executing program 2: 04:26:18 executing program 0: 04:26:18 executing program 4: 04:26:18 executing program 1: 04:26:18 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:19 executing program 2: 04:26:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r4, 0x0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) [ 3057.221358][ T27] kauditd_printk_skb: 161 callbacks suppressed [ 3057.221371][ T27] audit: type=1400 audit(1576383979.481:87350): avc: denied { map } for pid=22253 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:19 executing program 1: 04:26:19 executing program 4: 04:26:19 executing program 0: [ 3057.434365][ T27] audit: type=1400 audit(1576383979.481:87351): avc: denied { map } for pid=22253 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3057.583323][ T27] audit: type=1400 audit(1576383979.481:87352): avc: denied { map } for pid=22253 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:20 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) [ 3057.775016][ T27] audit: type=1400 audit(1576383979.481:87353): avc: denied { map } for pid=22253 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3057.956619][ T27] audit: type=1400 audit(1576383979.540:87354): avc: denied { map } for pid=22253 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:20 executing program 2: [ 3058.092896][ T27] audit: type=1400 audit(1576383979.629:87355): avc: denied { map } for pid=22253 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:20 executing program 4: 04:26:20 executing program 0: [ 3058.275533][ T27] audit: type=1400 audit(1576383979.629:87356): avc: denied { map } for pid=22253 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:20 executing program 1: 04:26:20 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r4, 0x0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) [ 3058.490909][ T27] audit: type=1400 audit(1576383979.649:87357): avc: denied { watch } for pid=11812 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3058.663562][ T27] audit: type=1400 audit(1576383979.719:87358): avc: denied { map } for pid=22253 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3058.835825][ T27] audit: type=1400 audit(1576383979.719:87359): avc: denied { map } for pid=22253 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:21 executing program 2: 04:26:21 executing program 4: 04:26:21 executing program 0: 04:26:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r4, 0x0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:21 executing program 1: 04:26:22 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) 04:26:22 executing program 4: 04:26:22 executing program 2: 04:26:22 executing program 0: 04:26:22 executing program 1: 04:26:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) socket$inet6(0xa, 0x2, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r4, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:23 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) 04:26:23 executing program 2: 04:26:23 executing program 0: 04:26:23 executing program 4: 04:26:24 executing program 1: 04:26:24 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) 04:26:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) shmget(0x1, 0x600000, 0x4, &(0x7f00009ff000/0x600000)=nil) r2 = getpgrp(0xffffffffffffffff) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r4, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:24 executing program 0: [ 3062.306717][ T27] kauditd_printk_skb: 169 callbacks suppressed [ 3062.306738][ T27] audit: type=1400 audit(1576383984.519:87529): avc: denied { map } for pid=22400 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:24 executing program 2: 04:26:24 executing program 4: [ 3062.534556][ T27] audit: type=1400 audit(1576383984.677:87530): avc: denied { map } for pid=22400 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3062.718201][ T27] audit: type=1400 audit(1576383984.697:87531): avc: denied { map } for pid=22400 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:25 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x4, &(0x7f0000000080)=0x0) pread64(r0, &(0x7f0000000180)=""/224, 0xe0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000140)={0x40000031, 0x2759, 0xd, 0x0, 0x0, r2, 0x0}]) [ 3062.897480][ T27] audit: type=1400 audit(1576383984.707:87532): avc: denied { watch } for pid=11720 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=1135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:26:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) r2 = getpgrp(0xffffffffffffffff) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r4, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) [ 3063.094023][ T27] audit: type=1400 audit(1576383984.886:87533): avc: denied { map } for pid=22404 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffd7) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000000, 0x0) [ 3063.260502][ T27] audit: type=1400 audit(1576383984.975:87534): avc: denied { map } for pid=22404 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:25 executing program 0: 04:26:25 executing program 2: 04:26:25 executing program 4: [ 3063.432089][ T27] audit: type=1400 audit(1576383984.975:87535): avc: denied { map } for pid=22404 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3063.633570][ T27] audit: type=1400 audit(1576383984.975:87536): avc: denied { map } for pid=22404 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3063.805023][ T27] audit: type=1400 audit(1576383985.034:87537): avc: denied { map } for pid=22407 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3063.986547][ T27] audit: type=1400 audit(1576383985.034:87538): avc: denied { map } for pid=22407 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:26 executing program 0: 04:26:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffd7) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000000, 0x0) 04:26:26 executing program 2: 04:26:26 executing program 4: 04:26:26 executing program 3: add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r2, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffd7) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000000, 0x0) 04:26:27 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x4, &(0x7f0000000080)=0x0) pread64(r0, &(0x7f0000000180)=""/224, 0xe0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000140)={0x40000031, 0x2759, 0xd, 0x0, 0x0, r2, 0x0}]) 04:26:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) r0 = accept4$unix(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) 04:26:27 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) semctl$SEM_INFO(0x0, 0x2, 0x13, 0x0) 04:26:27 executing program 3: add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r2, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:27 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 04:26:28 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffd7) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000000, 0x0) 04:26:28 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r2, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:29 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x4, &(0x7f0000000080)=0x0) pread64(r0, &(0x7f0000000180)=""/224, 0xe0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000140)={0x40000031, 0x2759, 0xd, 0x0, 0x0, r2, 0x0}]) 04:26:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) mount(&(0x7f0000000180)=@nullb='/dev/nullb0\x00', 0x0, &(0x7f0000000200)='autofs\x00', 0x20000, &(0x7f0000000240)='.\xd9-:[\x00') 04:26:29 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r2, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:29 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffd7) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000000, 0x0) 04:26:29 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) [ 3067.537446][ T27] kauditd_printk_skb: 155 callbacks suppressed [ 3067.537461][ T27] audit: type=1400 audit(1576383989.715:87694): avc: denied { map } for pid=22945 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3067.717552][ T27] audit: type=1400 audit(1576383989.745:87695): avc: denied { map } for pid=22945 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@empty}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x2}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) socket$key(0xf, 0x3, 0x2) r1 = socket(0x2000000000000010, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r2 = socket(0x10, 0x803, 0x0) socket(0x2000000000000010, 0x3, 0x0) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYRES16, @ANYBLOB="020029bd7000fddbdf250f000000080005000600"], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) writev(0xffffffffffffffff, &(0x7f0000000200), 0x0) [ 3067.868669][ T27] audit: type=1400 audit(1576383989.785:87696): avc: denied { map } for pid=22945 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3068.052748][ T27] audit: type=1400 audit(1576383989.785:87697): avc: denied { map } for pid=22945 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3068.202334][ T27] audit: type=1400 audit(1576383989.834:87698): avc: denied { map } for pid=22945 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:30 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r2, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:30 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) fsync(0xffffffffffffffff) [ 3068.404584][ T27] audit: type=1400 audit(1576383989.874:87699): avc: denied { map } for pid=22945 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3068.657132][ T27] audit: type=1400 audit(1576383989.874:87700): avc: denied { map } for pid=22945 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:31 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) io_setup(0x4, &(0x7f0000000080)=0x0) pread64(r0, &(0x7f0000000180)=""/224, 0xe0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000140)={0x40000031, 0x2759, 0xd, 0x0, 0x0, r2, 0x0}]) [ 3068.897231][ T27] audit: type=1400 audit(1576383989.894:87701): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3069.049992][ T27] audit: type=1400 audit(1576383989.953:87702): avc: denied { map } for pid=22945 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3069.221906][ T27] audit: type=1400 audit(1576383989.953:87703): avc: denied { map } for pid=22945 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:31 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffd7) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000000, 0x0) 04:26:31 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r2, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 04:26:32 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=@hat={'changehat '}, 0x1d) 04:26:32 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x208200) syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}, {[@timestamp={0x44, 0x4}]}}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 04:26:32 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:32 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r2, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/132, 0x84}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x100}, 0x10) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0051e) shutdown(r1, 0x0) shutdown(r2, 0x0) 04:26:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000b80)='./file0\x00', 0x200c2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 04:26:34 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:34 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r2, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:34 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000100)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, 0x0) 04:26:34 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) sync_file_range(r2, 0x0, 0x6, 0x1) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000740)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="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"], 0xfc7c) openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) fallocate(r3, 0x8, 0x0, 0x8000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000004540)={0xa, 0x4e28, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 3072.600984][ T27] kauditd_printk_skb: 159 callbacks suppressed [ 3072.601004][ T27] audit: type=1400 audit(1576383994.733:87863): avc: denied { map } for pid=23983 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3072.616338][ T27] audit: type=1400 audit(1576383994.733:87864): avc: denied { map } for pid=23983 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:34 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) madvise(&(0x7f0000080000/0x1000)=nil, 0x1000, 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) 04:26:35 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) [ 3072.884876][ T27] audit: type=1400 audit(1576383994.812:87865): avc: denied { map } for pid=24017 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:35 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r2, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) [ 3073.092033][ T27] audit: type=1400 audit(1576383994.812:87866): avc: denied { map } for pid=24017 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3073.256999][ T27] audit: type=1400 audit(1576383994.822:87867): avc: denied { map } for pid=24015 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3073.456831][ T27] audit: type=1400 audit(1576383994.822:87868): avc: denied { create } for pid=24008 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3073.670324][ T27] audit: type=1400 audit(1576383994.832:87869): avc: denied { map } for pid=23983 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3073.860629][ T27] audit: type=1400 audit(1576383994.852:87870): avc: denied { map } for pid=24015 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3074.086379][ T27] audit: type=1400 audit(1576383994.852:87871): avc: denied { map } for pid=24017 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3074.267669][ T27] audit: type=1400 audit(1576383994.852:87872): avc: denied { map } for pid=24017 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:36 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x7d, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f00000003c0), 0x4) clone3(&(0x7f00000002c0)={0x10840500, 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)=""/111, 0x6f, 0x0, &(0x7f0000000280)=[0x0, 0x0], 0x2}, 0x50) 04:26:36 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, 0x0) kcmp(0x0, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:37 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) sync_file_range(r2, 0x0, 0x6, 0x1) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000740)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="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"], 0xfc7c) openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) fallocate(r3, 0x8, 0x0, 0x8000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000004540)={0xa, 0x4e28, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:26:37 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, 0x0) 04:26:37 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, 0x0) kcmp(0x0, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:37 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:38 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) ptrace$getregset(0x4204, 0x0, 0x3, 0x0) 04:26:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) 04:26:38 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, 0x0) kcmp(0x0, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = getegid() chown(0x0, 0x0, r0) 04:26:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) fsetxattr$system_posix_acl(r0, 0x0, 0x0, 0x0, 0x0) [ 3077.692371][ T27] kauditd_printk_skb: 190 callbacks suppressed [ 3077.692386][ T27] audit: type=1400 audit(1576383999.781:88063): avc: denied { map } for pid=24690 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:39 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:39 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) kcmp(0x0, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) [ 3077.856062][ T27] audit: type=1400 audit(1576383999.850:88064): avc: denied { map } for pid=24690 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3077.995487][ T27] audit: type=1400 audit(1576383999.860:88065): avc: denied { map } for pid=24690 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3078.168155][ T27] audit: type=1400 audit(1576383999.930:88066): avc: denied { map } for pid=24690 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:40 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) [ 3078.346844][ T27] audit: type=1400 audit(1576383999.930:88067): avc: denied { map } for pid=24690 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3078.500663][ T27] audit: type=1400 audit(1576384000.009:88068): avc: denied { map } for pid=24690 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3078.639368][ T27] audit: type=1400 audit(1576384000.039:88069): avc: denied { map } for pid=24690 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3078.796119][ T27] audit: type=1400 audit(1576384000.059:88070): avc: denied { watch } for pid=11720 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3078.966557][ T27] audit: type=1400 audit(1576384000.059:88071): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=1134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:26:41 executing program 1: [ 3079.140439][ T27] audit: type=1400 audit(1576384000.535:88072): avc: denied { watch } for pid=11810 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=1135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:26:41 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) kcmp(0x0, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:41 executing program 4: 04:26:41 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:42 executing program 1: 04:26:42 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) kcmp(0x0, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:42 executing program 0: 04:26:42 executing program 4: 04:26:42 executing program 2: 04:26:43 executing program 1: 04:26:43 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:43 executing program 3: getpgrp(0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, 0x0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:43 executing program 4: 04:26:43 executing program 0: 04:26:43 executing program 2: 04:26:44 executing program 1: 04:26:44 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:44 executing program 3: getpgrp(0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, 0x0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:44 executing program 4: 04:26:44 executing program 0: 04:26:44 executing program 2: [ 3082.838022][ T27] kauditd_printk_skb: 173 callbacks suppressed [ 3082.838035][ T27] audit: type=1400 audit(1576384004.888:88246): avc: denied { watch } for pid=11810 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3083.001205][ T27] audit: type=1400 audit(1576384005.047:88247): avc: denied { watch } for pid=11812 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=1135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3083.125415][ T27] audit: type=1400 audit(1576384005.126:88248): avc: denied { watch } for pid=12236 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:26:45 executing program 1: 04:26:45 executing program 2: [ 3083.399026][ T27] audit: type=1400 audit(1576384005.443:88249): avc: denied { map } for pid=25427 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:45 executing program 4: [ 3083.512449][ T27] audit: type=1400 audit(1576384005.443:88250): avc: denied { map } for pid=25427 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3083.691318][ T27] audit: type=1400 audit(1576384005.443:88251): avc: denied { map } for pid=25427 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:45 executing program 3: getpgrp(0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, 0x0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) [ 3083.898979][ T27] audit: type=1400 audit(1576384005.443:88252): avc: denied { map } for pid=25427 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3084.094365][ T27] audit: type=1400 audit(1576384005.473:88253): avc: denied { map } for pid=25428 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:46 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:46 executing program 2: [ 3084.335409][ T27] audit: type=1400 audit(1576384005.473:88254): avc: denied { map } for pid=25428 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:46 executing program 1: 04:26:46 executing program 0: [ 3084.537707][ T27] audit: type=1400 audit(1576384005.473:88255): avc: denied { map } for pid=25428 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:46 executing program 4: 04:26:47 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r2, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:47 executing program 0: 04:26:47 executing program 4: 04:26:47 executing program 1: 04:26:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0x1, 0x0, 0xffffffff}) 04:26:47 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1000000000000006, 0x101102) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaa5f}, 0x204, 0x0, 0x0, 0x5, 0x40000000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0x0) r1 = socket(0x0, 0x0, 0x93) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$netlink(r2, 0x0, 0x0) getegid() getresuid(0x0, &(0x7f0000000300), &(0x7f0000000380)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) geteuid() lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) dup2(r1, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000780)=0xffffffffffffff4a) 04:26:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1000000000000006, 0x101102) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaa5f}, 0x204, 0x0, 0x0, 0x5, 0x40000000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0x0) r1 = socket(0x0, 0x0, 0x93) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$netlink(r2, &(0x7f0000000b00)=@proc={0x10, 0x0, 0x25dfdbff, 0x1000000}, 0xfffffe60) getegid() getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000380)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) dup2(r1, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000780)=0xffffffffffffff4a) 04:26:48 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r2, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:48 executing program 1: 04:26:48 executing program 2: 04:26:49 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:49 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r2, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 04:26:49 executing program 2: 04:26:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) dup2(r0, r1) [ 3087.906199][ T27] kauditd_printk_skb: 223 callbacks suppressed [ 3087.906213][ T27] audit: type=1400 audit(1576384009.916:88470): avc: denied { map } for pid=25468 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3088.117171][ T27] audit: type=1400 audit(1576384010.085:88471): avc: denied { create } for pid=25493 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:26:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'hsr0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'hsr0\x00L\x00H\x00\x00\x00\x00\x00\x00\xff\x00', 0x1}) 04:26:50 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r1, 0x6, 0xd, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) [ 3088.246413][ T27] audit: type=1400 audit(1576384010.124:88472): avc: denied { write } for pid=25493 comm="syz-executor.5" path="socket:[186247]" dev="sockfs" ino=186247 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3088.447614][ T27] audit: type=1400 audit(1576384010.124:88473): avc: denied { write } for pid=25493 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:26:50 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[]}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:50 executing program 3: mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000700)) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(0x0, 0x0) r2 = dup2(r0, r1) dup2(0xffffffffffffffff, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x541c, 0x0) [ 3088.651422][ T27] audit: type=1400 audit(1576384010.124:88474): avc: denied { write } for pid=25493 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:26:50 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sync_file_range(r2, 0x4, 0x6, 0x1) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_script(r4, &(0x7f0000000740)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="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"], 0xfc7c) openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000004540)={0xa, 0x4e28, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}, {&(0x7f0000000140)="cd27c0d84df0ad804ad5262a10c5f4", 0xf}, {&(0x7f00000012c0)="496288e0b56eefd3ff461c68e4fd5c8ecdcff3c85146c785e809c9ca7cb538fa2f0e2ca36adfc49e66123dec9cac26f3e4e77eadba335fecf61c5891ceea669ef775557e1b9d3415515a3ed13c2f932d1beb7d0e66fcf8", 0x57}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45ee22ba99cfe850d62e87e556e8fa3459", 0x32}], 0x4, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) [ 3088.814079][ T27] audit: type=1400 audit(1576384010.124:88475): avc: denied { write } for pid=25493 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3088.976020][ T27] audit: type=1400 audit(1576384010.194:88476): avc: denied { write } for pid=25493 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3089.146679][ T27] audit: type=1400 audit(1576384010.204:88477): avc: denied { write } for pid=25493 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3089.338187][ T27] audit: type=1400 audit(1576384010.243:88478): avc: denied { write } for pid=25493 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3089.536424][ T27] audit: type=1400 audit(1576384010.243:88479): avc: denied { write } for pid=25493 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:26:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x52, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0xc, 0x5, 0x0, 0x0, [{[@local]}]}, @timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 04:26:51 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002c000504d25a80648c63940d0224fc60100003400a020000053582c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 04:26:51 executing program 0: perf_event_open(&(0x7f0000000ec0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)=ANY=[]) 04:26:52 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[]}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 04:26:53 executing program 1: perf_event_open(&(0x7f0000000ec0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)=ANY=[]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0c0583b, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:26:53 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sync_file_range(r2, 0x4, 0x6, 0x1) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_script(r4, &(0x7f0000000740)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="0b7327a2e7a43579d73f51e4f04b40aba82d39d236ab989147a178c6fb1fb00000000000000004ce37fba68eb5d4d0c814f800b8421a484e5f05a03b291771f7687d63f44d4d868a2bf9e07a4bbe73396b90dbe52f52106d87ad88ee56d6af40aef26196cd375f691949aa8cb205b24edd346ff77ca97da9126599b615fad814efc0d9327f8ba09cb24b4bdbba76d2c1bedca41e51503f7b1e8a676c055f0d56e2628f857e7047669f7bc6046fa52af301857759c048ef24020a8a7bae4efd0d058796f1b92f3a76766b8dcbbf5c103f1c2e4076a0c4849546d488dfd889fa9ca42a39af1cd1a6566eee46aad9f35140be774ed849486f2872df796e884a082a08a1c4dd5b13d7aa0c9f11a30bbc97c934664d682e23db2352d4f27e3a0010000000001946eb6733004b9d2cda7f46cbb5b6a601ac72efbb9c5b3b9ce715aa47ce61f68ad4c8f26ed41ad87b056b76bb42878af640d581490dc8635acbbd8e50c3fe8f053e57fbf39ac262f840b3f097950101a5e0da5a761d531bf988ce111f0ebeadc486d6d0ac28fb5fa7ff4b3c509285c5c4c084a9cd7a4bf968b7c4e223463bff9140fe011e9b9e1a6660054937be2414607cc3c5d997a2639fc6019f03007bf6802a0e61ea5f7da0e140e44aa4e2e40b039f9d82020855ad902d8bff0f000000000000c785add59370d92fa10800ebcda26b85fe669d02e73f68bbd55f6e8dfd026c931761e148dd6f2037f530cdb9d5aaf7389bd2536237ba8d254c1fb713e5d1f81e5242c0c016750e4f092f44a8d38671d3053007ffa5dcef4c022891a4e620981cd247b1590952c337b211f85accda96a1edb82100a973d1981f8904e6268c5e89d6323ca5379a689120c999e464965613d43f2ee42ec539256d"], 0xfc7c) openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000004540)={0xa, 0x4e28, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}, {&(0x7f0000000140)="cd27c0d84df0ad804ad5262a10c5f4", 0xf}, {&(0x7f00000012c0)="496288e0b56eefd3ff461c68e4fd5c8ecdcff3c85146c785e809c9ca7cb538fa2f0e2ca36adfc49e66123dec9cac26f3e4e77eadba335fecf61c5891ceea669ef775557e1b9d3415515a3ed13c2f932d1beb7d0e66fcf8", 0x57}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45ee22ba99cfe850d62e87e556e8fa3459", 0x32}], 0x4, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) 04:26:53 executing program 4: perf_event_open(&(0x7f0000000ec0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)=ANY=[]) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:26:53 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[]}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:53 executing program 0: perf_event_open(&(0x7f0000000ec0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) gettid() 04:26:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) [ 3092.969113][ T27] kauditd_printk_skb: 212 callbacks suppressed [ 3092.969128][ T27] audit: type=1400 audit(1576384014.934:88692): avc: denied { open } for pid=26635 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 3093.190833][ T27] audit: type=1400 audit(1576384014.964:88693): avc: denied { map } for pid=26629 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3093.374420][ T27] audit: type=1400 audit(1576384015.043:88694): avc: denied { create } for pid=26645 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3093.551044][ T27] audit: type=1400 audit(1576384015.053:88695): avc: denied { map } for pid=26650 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:55 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB]}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) [ 3093.742213][ T27] audit: type=1400 audit(1576384015.093:88696): avc: denied { write } for pid=26645 comm="syz-executor.5" path="socket:[186334]" dev="sockfs" ino=186334 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:26:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924fafe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000", 0xa7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:26:55 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sync_file_range(r2, 0x4, 0x6, 0x1) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_script(r4, &(0x7f0000000740)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="0b7327a2e7a43579d73f51e4f04b40aba82d39d236ab989147a178c6fb1fb00000000000000004ce37fba68eb5d4d0c814f800b8421a484e5f05a03b291771f7687d63f44d4d868a2bf9e07a4bbe73396b90dbe52f52106d87ad88ee56d6af40aef26196cd375f691949aa8cb205b24edd346ff77ca97da9126599b615fad814efc0d9327f8ba09cb24b4bdbba76d2c1bedca41e51503f7b1e8a676c055f0d56e2628f857e7047669f7bc6046fa52af301857759c048ef24020a8a7bae4efd0d058796f1b92f3a76766b8dcbbf5c103f1c2e4076a0c4849546d488dfd889fa9ca42a39af1cd1a6566eee46aad9f35140be774ed849486f2872df796e884a082a08a1c4dd5b13d7aa0c9f11a30bbc97c934664d682e23db2352d4f27e3a0010000000001946eb6733004b9d2cda7f46cbb5b6a601ac72efbb9c5b3b9ce715aa47ce61f68ad4c8f26ed41ad87b056b76bb42878af640d581490dc8635acbbd8e50c3fe8f053e57fbf39ac262f840b3f097950101a5e0da5a761d531bf988ce111f0ebeadc486d6d0ac28fb5fa7ff4b3c509285c5c4c084a9cd7a4bf968b7c4e223463bff9140fe011e9b9e1a6660054937be2414607cc3c5d997a2639fc6019f03007bf6802a0e61ea5f7da0e140e44aa4e2e40b039f9d82020855ad902d8bff0f000000000000c785add59370d92fa10800ebcda26b85fe669d02e73f68bbd55f6e8dfd026c931761e148dd6f2037f530cdb9d5aaf7389bd2536237ba8d254c1fb713e5d1f81e5242c0c016750e4f092f44a8d38671d3053007ffa5dcef4c022891a4e620981cd247b1590952c337b211f85accda96a1edb82100a973d1981f8904e6268c5e89d6323ca5379a689120c999e464965613d43f2ee42ec539256d"], 0xfc7c) openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000004540)={0xa, 0x4e28, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}, {&(0x7f0000000140)="cd27c0d84df0ad804ad5262a10c5f4", 0xf}, {&(0x7f00000012c0)="496288e0b56eefd3ff461c68e4fd5c8ecdcff3c85146c785e809c9ca7cb538fa2f0e2ca36adfc49e66123dec9cac26f3e4e77eadba335fecf61c5891ceea669ef775557e1b9d3415515a3ed13c2f932d1beb7d0e66fcf8", 0x57}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45ee22ba99cfe850d62e87e556e8fa3459", 0x32}], 0x4, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) [ 3093.941968][ T27] audit: type=1400 audit(1576384015.122:88698): avc: denied { map } for pid=26650 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3094.096755][ T27] audit: type=1400 audit(1576384015.122:88699): avc: denied { write } for pid=26645 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3094.227493][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3094.233372][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3094.308605][ T27] audit: type=1400 audit(1576384015.122:88700): avc: denied { map } for pid=26650 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:26:56 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) removexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@known='trusted.syz\x00') [ 3094.480318][ T27] audit: type=1400 audit(1576384015.122:88701): avc: denied { write } for pid=26645 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3094.678919][ T27] audit: type=1400 audit(1576384015.122:88702): avc: denied { write } for pid=26645 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3094.794091][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3094.801742][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3094.809203][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3094.816536][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:26:57 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x400000dd) 04:26:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$system_posix_acl(r0, 0x0, 0x0, 0x0, 0x0) 04:26:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_unix(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x86830, &(0x7f0000000300)=ANY=[@ANYBLOB]) 04:26:57 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB]}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:58 executing program 0: pipe(&(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TEAM_CMD_NOOP(r0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={@multicast1, @loopback}, &(0x7f0000000340)=0xc) 04:26:58 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB]}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:26:59 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) 04:26:59 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) write(r0, &(0x7f00000000c0)="24000000580001000000f4f9002304000a04f61108000100000100bf0800b355ea834809", 0x24) 04:26:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040)=[{r0, 0x40}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup2(r2, r3) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f0000000000)={0x0, 0x10000}, 0x10) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x8}, 0x8) recvfrom$inet(r4, 0x0, 0x1cd, 0x0, 0x0, 0x800e0050e) shutdown(r3, 0x0) 04:26:59 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sync_file_range(r2, 0x4, 0x6, 0x1) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_script(r4, &(0x7f0000000740)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="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"], 0xfc7c) openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000004540)={0xa, 0x4e28, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}, {&(0x7f0000000140)="cd27c0d84df0ad804ad5262a10c5f4", 0xf}, {&(0x7f00000012c0)="496288e0b56eefd3ff461c68e4fd5c8ecdcff3c85146c785e809c9ca7cb538fa2f0e2ca36adfc49e66123dec9cac26f3e4e77eadba335fecf61c5891ceea669ef775557e1b9d3415515a3ed13c2f932d1beb7d0e66fcf8", 0x57}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45ee22ba99cfe850d62e87e556e8fa3459", 0x32}], 0x4, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) 04:26:59 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000"], 0x4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) [ 3098.043722][ T27] kauditd_printk_skb: 191 callbacks suppressed [ 3098.043738][ T27] audit: type=1400 audit(1576384019.962:88893): avc: denied { map } for pid=27736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) [ 3098.246604][ T27] audit: type=1400 audit(1576384020.012:88894): avc: denied { map } for pid=27736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3098.420455][ T27] audit: type=1400 audit(1576384020.041:88895): avc: denied { map } for pid=27742 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:00 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) [ 3098.662423][ T27] audit: type=1400 audit(1576384020.041:88896): avc: denied { map } for pid=27736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3098.856394][ T27] audit: type=1400 audit(1576384020.051:88897): avc: denied { map } for pid=27736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3099.071108][ T27] audit: type=1400 audit(1576384020.071:88898): avc: denied { map } for pid=27742 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3099.245992][ T27] audit: type=1400 audit(1576384020.071:88899): avc: denied { open } for pid=27734 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 04:27:01 executing program 4: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x311}], 0x1, 0x0, 0x0, 0x1f5) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="34f0010018000000eab8ad8eb431ce00781a80c7c5579a29187fdbf27857d0"], 0x0, 0x1f}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 3099.445818][ T27] audit: type=1400 audit(1576384020.091:88900): avc: denied { map } for pid=27742 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) eventfd(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x18, 0x0, 0x3) getpid() r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x1000, 0x0, 0x5, 0xfffffffffffffffb, 0xffff}) accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @dev}, &(0x7f00000001c0)=0x10, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000200)={'TPROXY\x00'}, 0x0) [ 3099.542779][T28003] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3099.573438][T27877] audit: audit_backlog=65 > audit_backlog_limit=64 04:27:01 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000"], 0x4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:27:01 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) llistxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:27:02 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) ioctl$FIBMAP(r0, 0x1, 0x0) 04:27:02 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000"], 0x4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:27:02 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x67faf42d5e4f3ace}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, &(0x7f0000000100)={0x77359400}, 0x10) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000000)=""/200, 0xc8) 04:27:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)=""/121, 0x79}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)=""/180, 0xb4}, {0x0}, {0x0}], 0x3}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xd051, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 04:27:03 executing program 1: socket$inet6(0xa, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x20}) 04:27:03 executing program 3: r0 = socket$tipc(0x1e, 0x1, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000000), 0x4) 04:27:04 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000109"], 0x6}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:27:04 executing program 3: uname(&(0x7f0000000080)=""/13) 04:27:05 executing program 4: poll(&(0x7f0000000080), 0x2000000000000037, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x2b36, 0x0, 0x0, 0x800e00946) mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r1, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) shutdown(r0, 0x0) [ 3103.103354][ T27] kauditd_printk_skb: 233 callbacks suppressed [ 3103.103366][ T27] audit: type=1400 audit(1576384024.980:89103): avc: denied { map } for pid=28873 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:05 executing program 2: sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000001c0)={0x2, 0x0, @ioapic={0x4, 0xffff8001, 0x1, 0x1ff, 0x0, [{0x0, 0x9d}, {0x0, 0x0, 0x7f}, {}, {0x0, 0x3, 0x1}, {0x0, 0xff}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x8}, {0x1f}, {}, {}, {0x0, 0x81, 0x0, [], 0x40}, {}, {0x9}, {0x0, 0x9}, {}, {}, {}, {0x68, 0x0, 0x0, [], 0x16}, {0x0, 0x0, 0x4}]}}) [ 3103.323172][ T27] audit: type=1400 audit(1576384025.030:89104): avc: denied { map } for pid=28738 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3103.506292][ T27] audit: type=1400 audit(1576384025.030:89105): avc: denied { map } for pid=28738 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3103.712151][ T27] audit: type=1400 audit(1576384025.030:89106): avc: denied { map } for pid=28873 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:05 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) [ 3103.893737][ T27] audit: type=1400 audit(1576384025.039:89107): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3104.091831][ T27] audit: type=1400 audit(1576384025.039:89108): avc: denied { map } for pid=28873 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, &(0x7f0000000040)) 04:27:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='qnx6\x00', 0x100000, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) sync() ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'vet\x00\x00\x00_b\x1f\x1cC\xa5e\x00', 0x0}) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @random="5320d11fbcbb"}, 0x10) [ 3104.276504][ T27] audit: type=1400 audit(1576384025.139:89109): avc: denied { map } for pid=28873 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:06 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000109"], 0x6}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) [ 3104.431502][ T27] audit: type=1400 audit(1576384025.198:89110): avc: denied { map } for pid=28873 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3104.610984][ T27] audit: type=1400 audit(1576384025.238:89111): avc: denied { map } for pid=28873 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3104.817118][ T27] audit: type=1400 audit(1576384025.297:89112): avc: denied { map } for pid=28873 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:07 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x4) 04:27:07 executing program 2: accept$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x10}) 04:27:07 executing program 3: getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) r0 = memfd_create(&(0x7f0000000100)='\x00L\xec\xce>K\xdd\xc0P\x00', 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x101080, 0x0) r1 = dup(r0) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000040)={0x0, 0x4004}) execveat(r1, &(0x7f00000000c0)='\x00', &(0x7f0000000140), 0x0, 0x1000) 04:27:07 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000109"], 0x6}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:27:08 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:08 executing program 1: 04:27:08 executing program 4: 04:27:09 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090f"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:27:09 executing program 1: 04:27:09 executing program 2: [ 3107.676787][ T1598] block nbd0: Receive control failed (result -107) [ 3107.689077][ T1598] block nbd0: Receive control failed (result -107) [ 3107.697260][ T1598] block nbd0: Receive control failed (result -107) [ 3107.708940][T29545] block nbd0: shutting down sockets 04:27:09 executing program 4: [ 3108.294629][ T27] kauditd_printk_skb: 212 callbacks suppressed [ 3108.294642][ T27] audit: type=1400 audit(1576384030.137:89307): avc: denied { map } for pid=29713 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3108.478463][ T27] audit: type=1400 audit(1576384030.137:89308): avc: denied { map } for pid=29713 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:10 executing program 2: [ 3108.629362][ T27] audit: type=1400 audit(1576384030.137:89309): avc: denied { map } for pid=29713 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:10 executing program 1: [ 3108.768340][ T27] audit: type=1400 audit(1576384030.137:89310): avc: denied { map } for pid=29713 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:10 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:10 executing program 3: 04:27:10 executing program 4: [ 3108.938400][ T27] audit: type=1400 audit(1576384030.137:89311): avc: denied { map } for pid=29723 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3109.047257][ T27] audit: type=1400 audit(1576384030.137:89312): avc: denied { map } for pid=29723 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:10 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090f"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) [ 3109.233396][ T27] audit: type=1400 audit(1576384030.186:89313): avc: denied { map } for pid=29723 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3109.495162][ T27] audit: type=1400 audit(1576384030.186:89314): avc: denied { map } for pid=29723 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3109.656692][ T27] audit: type=1400 audit(1576384030.216:89315): avc: denied { map } for pid=29713 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:11 executing program 4: 04:27:11 executing program 2: [ 3109.807217][ T27] audit: type=1400 audit(1576384030.246:89316): avc: denied { map } for pid=29723 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:11 executing program 3: 04:27:11 executing program 1: [ 3110.316797][ T1598] block nbd0: Receive control failed (result -107) [ 3110.333911][T29650] block nbd0: Receive control failed (result -107) [ 3110.334080][ T1598] block nbd0: Receive control failed (result -107) [ 3110.401560][T29799] block nbd0: shutting down sockets 04:27:12 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:12 executing program 4: 04:27:12 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090f"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:27:12 executing program 2: 04:27:12 executing program 1: 04:27:13 executing program 3: 04:27:13 executing program 4: 04:27:13 executing program 2: 04:27:13 executing program 1: 04:27:13 executing program 3: 04:27:14 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:14 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r1, 0x0, 0x80000000, 0x0) 04:27:14 executing program 2: 04:27:14 executing program 4: 04:27:15 executing program 3: 04:27:15 executing program 1: [ 3113.346987][ T27] kauditd_printk_skb: 211 callbacks suppressed [ 3113.347002][ T27] audit: type=1400 audit(1576384035.145:89510): avc: denied { map } for pid=30029 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3113.527658][ T27] audit: type=1400 audit(1576384035.204:89511): avc: denied { map } for pid=30029 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3113.675204][ T27] audit: type=1400 audit(1576384035.244:89512): avc: denied { map } for pid=30029 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3113.881074][ T27] audit: type=1400 audit(1576384035.244:89513): avc: denied { map } for pid=30029 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.051365][ T27] audit: type=1400 audit(1576384035.284:89514): avc: denied { watch } for pid=11720 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:27:15 executing program 4: 04:27:16 executing program 2: [ 3114.228374][ T27] audit: type=1400 audit(1576384035.294:89515): avc: denied { map } for pid=30029 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:16 executing program 3: [ 3114.396398][ T27] audit: type=1400 audit(1576384035.353:89516): avc: denied { map } for pid=30031 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:16 executing program 1: [ 3114.546660][ T27] audit: type=1400 audit(1576384035.353:89517): avc: denied { map } for pid=30031 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:16 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) socket(0x2, 0x1, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:16 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r1, 0x0, 0x80000000, 0x0) [ 3114.758413][ T27] audit: type=1400 audit(1576384035.353:89518): avc: denied { map } for pid=30031 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3114.945972][ T27] audit: type=1400 audit(1576384035.383:89519): avc: denied { map } for pid=30029 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:16 executing program 4: 04:27:17 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) r0 = accept(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) 04:27:17 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r0, 0x0, 0x0) 04:27:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000080)) [ 3115.711012][T29650] block nbd0: Receive control failed (result -107) [ 3115.711086][ T1598] block nbd0: Receive control failed (result -107) [ 3115.769238][T30146] block nbd0: shutting down sockets 04:27:17 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) socket(0x2, 0x1, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) ptrace$getregset(0x4204, 0x0, 0x6, &(0x7f0000000100)={0x0}) 04:27:18 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r1, 0x0, 0x80000000, 0x0) 04:27:18 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r1, 0x6, 0x24, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) 04:27:19 executing program 4: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x46, &(0x7f0000000200)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "88dc4f", 0x10, 0x2c, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7000000]}, @mcast2, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, "3db41b"}}}}}}}, 0x0) 04:27:19 executing program 2: [ 3117.824987][T30277] block nbd0: shutting down sockets 04:27:19 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) socket(0x2, 0x1, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:19 executing program 1: dup(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x20) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x1b, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x27}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x20) dup2(r2, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x20) dup2(0xffffffffffffffff, r4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) [ 3118.419178][ T27] kauditd_printk_skb: 160 callbacks suppressed [ 3118.419193][ T27] audit: type=1400 audit(1576384040.123:89680): avc: denied { map } for pid=30564 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4913, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, 0x0, 0x8080fffffffe) [ 3118.549475][ T27] audit: type=1400 audit(1576384040.203:89681): avc: denied { map } for pid=30564 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:20 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000880)=[@mask_fadd={0x58, 0x114, 0x7, {{}, &(0x7f0000000180), 0x0}}], 0x58}, 0x0) 04:27:20 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:27:20 executing program 4: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x46, &(0x7f0000000200)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "88dc4f", 0x10, 0x2c, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7000000]}, @mcast2, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, "3db41b"}}}}}}}, 0x0) [ 3118.782418][ T27] audit: type=1400 audit(1576384040.242:89682): avc: denied { map } for pid=30564 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3118.944224][ T27] audit: type=1400 audit(1576384040.272:89683): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=1134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3119.145947][ T27] audit: type=1400 audit(1576384040.292:89684): avc: denied { map } for pid=30564 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3119.369698][ T27] audit: type=1400 audit(1576384040.292:89685): avc: denied { map } for pid=30564 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3119.559172][ T27] audit: type=1400 audit(1576384040.331:89686): avc: denied { map } for pid=30580 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3119.696962][ T27] audit: type=1400 audit(1576384040.331:89687): avc: denied { map } for pid=30564 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0x1, 0x4, 0xffffffff}) [ 3119.736407][ T27] audit: type=1400 audit(1576384040.341:89688): avc: denied { map } for pid=30564 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3119.854264][T30789] atomic_op 0000000075d835e6 conn xmit_atomic 000000000daf12bb [ 3119.862235][ T27] audit: type=1400 audit(1576384040.361:89689): avc: denied { map } for pid=30580 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:21 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:21 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0x1, 0x4}) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f00000010c0)={0xfffffffffffffd22, 0x0}) [ 3120.006152][T30582] block nbd0: shutting down sockets 04:27:21 executing program 2: 04:27:22 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:27:22 executing program 3: 04:27:22 executing program 1: 04:27:22 executing program 2: 04:27:23 executing program 4: [ 3121.353841][T29650] block nbd0: Receive control failed (result -107) [ 3121.363769][T29650] block nbd0: Receive control failed (result -107) [ 3121.414934][T31003] block nbd0: shutting down sockets 04:27:23 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:23 executing program 3: 04:27:24 executing program 2: 04:27:24 executing program 1: 04:27:24 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 04:27:24 executing program 4: 04:27:25 executing program 3: 04:27:25 executing program 2: 04:27:25 executing program 1: [ 3123.495426][ T27] kauditd_printk_skb: 171 callbacks suppressed [ 3123.495441][ T27] audit: type=1400 audit(1576384045.201:89861): avc: denied { map } for pid=31030 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3123.657506][ T27] audit: type=1400 audit(1576384045.211:89862): avc: denied { map } for pid=31063 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:25 executing program 4: [ 3123.813556][ T27] audit: type=1400 audit(1576384045.250:89863): avc: denied { map } for pid=31030 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3123.958226][T31021] block nbd0: shutting down sockets 04:27:25 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffd7) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000000, 0x0) [ 3123.985757][ T27] audit: type=1400 audit(1576384045.260:89864): avc: denied { map } for pid=31063 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:25 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) ioctl$NBD_DO_IT(r0, 0xab03) [ 3124.210086][ T27] audit: type=1400 audit(1576384045.270:89865): avc: denied { map } for pid=31063 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:26 executing program 3: [ 3124.366622][ T27] audit: type=1400 audit(1576384045.320:89866): avc: denied { map } for pid=31063 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:26 executing program 2: 04:27:26 executing program 1: [ 3124.561713][ T27] audit: type=1400 audit(1576384045.330:89867): avc: denied { map } for pid=31063 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3124.750855][ T27] audit: type=1400 audit(1576384045.429:89868): avc: denied { map } for pid=31063 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:26 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffd7) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000000, 0x0) 04:27:26 executing program 4: [ 3124.922277][ T27] audit: type=1400 audit(1576384045.449:89869): avc: denied { map } for pid=31063 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3125.131700][ T27] audit: type=1400 audit(1576384045.667:89870): avc: denied { watch } for pid=11810 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:27:27 executing program 3: 04:27:27 executing program 2: 04:27:27 executing program 1: 04:27:27 executing program 4: [ 3126.033679][T31140] block nbd0: shutting down sockets 04:27:27 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffd7) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000000, 0x0) 04:27:27 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) syz_open_dev$ndb(0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r3) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:28 executing program 3: 04:27:28 executing program 2: 04:27:28 executing program 1: 04:27:28 executing program 4: 04:27:28 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) [ 3127.215907][T29650] block nbd0: Receive control failed (result -107) [ 3127.233888][T29650] block nbd0: Receive control failed (result -107) [ 3127.247986][T31261] block nbd0: shutting down sockets 04:27:29 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) syz_open_dev$ndb(0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r3) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:29 executing program 3: 04:27:29 executing program 1: 04:27:29 executing program 2: 04:27:29 executing program 4: 04:27:30 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) [ 3128.557429][ T27] kauditd_printk_skb: 153 callbacks suppressed [ 3128.557442][ T27] audit: type=1400 audit(1576384050.219:90024): avc: denied { map } for pid=31297 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:30 executing program 3: [ 3128.713734][ T27] audit: type=1400 audit(1576384050.298:90025): avc: denied { map } for pid=31297 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:30 executing program 1: [ 3128.856976][ T27] audit: type=1400 audit(1576384050.298:90026): avc: denied { map } for pid=31297 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:30 executing program 2: [ 3129.007016][ T27] audit: type=1400 audit(1576384050.348:90027): avc: denied { map } for pid=31297 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:30 executing program 4: 04:27:30 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) syz_open_dev$ndb(0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r3) ioctl$NBD_DO_IT(r0, 0xab03) [ 3129.179403][ T27] audit: type=1400 audit(1576384050.348:90028): avc: denied { map } for pid=31297 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:30 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) [ 3129.303490][ T27] audit: type=1400 audit(1576384050.437:90029): avc: denied { map } for pid=31297 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3129.449866][ T27] audit: type=1400 audit(1576384050.437:90030): avc: denied { map } for pid=31297 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:31 executing program 3: [ 3129.580883][ T27] audit: type=1400 audit(1576384050.556:90031): avc: denied { map } for pid=31346 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3129.761158][ T27] audit: type=1400 audit(1576384050.556:90032): avc: denied { map } for pid=31346 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:31 executing program 1: 04:27:31 executing program 2: [ 3129.965260][ T27] audit: type=1400 audit(1576384050.556:90033): avc: denied { map } for pid=31346 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:31 executing program 4: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) socket$inet_udplite(0x2, 0x2, 0x88) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 04:27:32 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 04:27:32 executing program 3: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 04:27:32 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10971615) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:27:32 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, 0xffffffffffffffff) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) 04:27:33 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 04:27:33 executing program 4: socket$inet6(0x10, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'mangle\x00'}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000440)}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x4000000000000000}, {0xfffffffffffffffd, 0x7}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x2, 0x6}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="72617700000000000000000000000000000000400000000200000000000000"], &(0x7f00000004c0)=0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x22400, 0x0) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) [ 3132.545529][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3132.551390][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3132.557338][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3132.563236][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:27:34 executing program 3: 04:27:34 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000001090fff"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 04:27:34 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r3 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score\x00') sendfile(r2, r3, 0x0, 0x1) fcntl$setpipe(r1, 0x407, 0x0) shmget$private(0x0, 0x2000, 0x78000000, &(0x7f0000ffb000/0x2000)=nil) write(r1, &(0x7f0000000340), 0x41395527) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$UI_END_FF_ERASE(r5, 0x400c55cb, &(0x7f0000000140)={0x6, 0x200, 0x4}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x2ca8}, 0x0, 0x3, 0xffffffffffffffff, 0xbd837be91bb220f4) syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) [ 3132.738750][T31574] block nbd0: shutting down sockets 04:27:34 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, 0xffffffffffffffff) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) [ 3133.007919][T31661] bridge0: port 1(bridge_slave_0) entered disabled state [ 3133.281645][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3133.292612][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3133.513581][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3133.519644][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3133.617677][ T27] kauditd_printk_skb: 152 callbacks suppressed [ 3133.617694][ T27] audit: type=1400 audit(1576384055.247:90186): avc: denied { map } for pid=31991 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3133.829525][ T27] audit: type=1400 audit(1576384055.306:90187): avc: denied { map } for pid=31991 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 04:27:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x9b02e6d4404d0861, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000002c0)={0x3}, 0x374) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0xe00) sendfile(r0, r1, 0x0, 0x12000) [ 3133.998704][ T27] audit: type=1400 audit(1576384055.316:90188): avc: denied { map } for pid=32013 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:35 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x23b) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc822, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x1b}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x1d9d0f791b60a80e) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = semget$private(0x0, 0x8, 0x0) semop(r2, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}], 0x1) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f0000000600)=""/4096) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000480)) restart_syscall() socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) connect$llc(r3, &(0x7f0000000500)={0x1a, 0x1, 0x0, 0x9}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x40003ad, 0x0) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) r4 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r6, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001980)='/dev/full\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) 04:27:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000580)={"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"}) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) 04:27:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) [ 3136.269004][ T1598] block nbd0: Receive control failed (result -107) [ 3136.269010][T29650] block nbd0: Receive control failed (result -107) [ 3136.291306][T32727] block nbd0: shutting down sockets 04:27:38 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:38 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x7, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11000, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) socket$packet(0x11, 0x2, 0x300) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f00000001c0)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000180)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f'}) socket(0x1000000010, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x400000400080803, 0x0) dup(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0xa, 0x0, 0x0) setuid(0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000008380)={&(0x7f0000000080), 0xc, 0x0}, 0x0) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 04:27:39 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) r3 = gettid() fcntl$setown(r0, 0x8, r3) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000140)="390000001100090468fe0700000000000700ff3f0800000045000e070000001419001a00", 0x24}], 0x1) open(0x0, 0x141042, 0x0) pipe(&(0x7f0000000040)) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) open(0x0, 0x141042, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) open(&(0x7f00000005c0)='./control\x00', 0x0, 0x0) 04:27:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@ipv4, 0x1e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000280)=""/69, 0xfffffffffffffe89}], 0x3, 0x0, 0x159ae6f857735efc, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 3137.783699][ T1598] block nbd0: Receive control failed (result -107) [ 3137.800638][ T1598] block nbd0: Receive control failed (result -107) [ 3137.815535][ T541] block nbd0: shutting down sockets 04:27:39 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:39 executing program 1: syz_open_dev$audion(0x0, 0x4, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='./file0\x00') prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000200)={'rose0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 04:27:40 executing program 5: perf_event_open(&(0x7f0000000ec0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYBLOB="040000000000"]) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) [ 3138.746389][ T27] kauditd_printk_skb: 154 callbacks suppressed [ 3138.746404][ T27] audit: type=1400 audit(1576384060.324:90350): avc: denied { map } for pid=800 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3139.022779][ T27] audit: type=1400 audit(1576384060.334:90351): avc: denied { map } for pid=800 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x7d, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) open(&(0x7f0000000b80)='./file0\x00', 0x200c2, 0x0) 04:27:40 executing program 3: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r1, &(0x7f0000000a40), 0x8000000000000b0, 0x0) [ 3139.263752][ T27] audit: type=1400 audit(1576384060.443:90352): avc: denied { map } for pid=800 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3139.414364][ T27] audit: type=1400 audit(1576384060.473:90353): avc: denied { map } for pid=800 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3139.582736][ T27] audit: type=1400 audit(1576384060.483:90354): avc: denied { open } for pid=815 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 04:27:41 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) [ 3139.789490][ T27] audit: type=1400 audit(1576384060.651:90355): avc: denied { map } for pid=829 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3139.955557][ T27] audit: type=1400 audit(1576384060.681:90356): avc: denied { map } for pid=829 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:41 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) [ 3140.102490][ T27] audit: type=1400 audit(1576384060.711:90357): avc: denied { map } for pid=829 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3140.290133][ T27] audit: type=1400 audit(1576384060.731:90358): avc: denied { map } for pid=829 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x2) 04:27:42 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) lsetxattr$security_capability(0x0, &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x2) [ 3140.701536][ T27] audit: type=1400 audit(1576384060.830:90359): avc: denied { map } for pid=829 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:42 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x2) 04:27:42 executing program 4: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @dev}, &(0x7f0000000040)=0xc) socket$netlink(0x10, 0x3, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f00000000c0)=""/210) r1 = semget$private(0x0, 0x4, 0xc1) semop(r1, &(0x7f00000001c0)=[{0x0, 0x9}, {}], 0x2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/mnt\x00') ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000340)={0x0, 0x0, 0x4, 0x0, 0x0, [{0xffffffffffffffff, 0x0, 0x100000001}, {0xffffffffffffffff, 0x0, 0x6}, {}, {}]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000980)='security.selinux\x00', 0x0, 0x0, 0x2) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) [ 3141.513832][ T1598] block nbd0: Receive control failed (result -107) [ 3141.524689][ T1598] block nbd0: Receive control failed (result -107) [ 3141.537359][ T1457] block nbd0: shutting down sockets 04:27:43 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) syz_open_dev$ndb(0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r3) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 04:27:43 executing program 5: 04:27:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x3c}, 0x8}, 0x0) 04:27:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000240)="b9900d00000f32640f01bb0b00000065f30f0054b1946726420f09dfef66bad104ed2e260f7832b95c080000b807000000ba000000000f3036430d6389000066b8ea008ec0", 0x45}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:27:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0a000000010000007b"], 0x0) 04:27:45 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x800) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000140)=""/144, 0x436}], 0x1) 04:27:45 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) syz_open_dev$ndb(0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r3) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_genetlink_get_family_id$nbd(0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c66b88687d08c66efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c06635020000800f01c9b800088ec00fae470b", 0x2ed}], 0xaaaaaaaaaaaad29, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 3143.801268][ T27] kauditd_printk_skb: 147 callbacks suppressed [ 3143.801282][ T27] audit: type=1400 audit(1576384065.342:90507): avc: denied { map } for pid=1950 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3143.993496][ T27] audit: type=1400 audit(1576384065.412:90508): avc: denied { map } for pid=1901 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3144.135329][ T27] audit: type=1400 audit(1576384065.412:90509): avc: denied { map } for pid=1901 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3144.370811][ T27] audit: type=1400 audit(1576384065.421:90510): avc: denied { map } for pid=1950 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:46 executing program 3: [ 3144.579288][ T27] audit: type=1400 audit(1576384065.431:90511): avc: denied { map } for pid=1950 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3144.742444][ T27] audit: type=1400 audit(1576384065.431:90512): avc: denied { map } for pid=1950 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:46 executing program 4: [ 3144.930939][ T27] audit: type=1400 audit(1576384065.441:90513): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:27:46 executing program 1: 04:27:46 executing program 5: [ 3145.107901][ T27] audit: type=1400 audit(1576384065.511:90514): avc: denied { map } for pid=1950 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3145.292912][ T27] audit: type=1400 audit(1576384065.560:90515): avc: denied { map } for pid=1950 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3145.484334][ T27] audit: type=1400 audit(1576384065.630:90516): avc: denied { map } for pid=1950 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:47 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) syz_open_dev$ndb(0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r3) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:47 executing program 3: 04:27:47 executing program 5: 04:27:47 executing program 4: 04:27:47 executing program 2: 04:27:47 executing program 1: 04:27:48 executing program 3: 04:27:48 executing program 2: 04:27:48 executing program 5: 04:27:48 executing program 4: 04:27:49 executing program 1: 04:27:49 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, 0xffffffffffffffff) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:49 executing program 3: 04:27:49 executing program 5: 04:27:49 executing program 2: 04:27:49 executing program 4: 04:27:50 executing program 1: 04:27:50 executing program 3: [ 3148.853711][ T27] kauditd_printk_skb: 127 callbacks suppressed [ 3148.853727][ T27] audit: type=1400 audit(1576384070.350:90644): avc: denied { map } for pid=2578 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:50 executing program 5: 04:27:50 executing program 2: 04:27:50 executing program 4: [ 3149.073679][ T27] audit: type=1400 audit(1576384070.350:90645): avc: denied { map } for pid=2578 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3149.272565][ T27] audit: type=1400 audit(1576384070.410:90646): avc: denied { map } for pid=2567 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3149.437087][ T27] audit: type=1400 audit(1576384070.420:90647): avc: denied { map } for pid=2578 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:51 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, 0xffffffffffffffff) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) [ 3149.648631][ T27] audit: type=1400 audit(1576384070.449:90648): avc: denied { map } for pid=2567 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:51 executing program 3: 04:27:51 executing program 1: [ 3149.836676][ T27] audit: type=1400 audit(1576384070.459:90649): avc: denied { map } for pid=2578 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:51 executing program 4: 04:27:51 executing program 2: 04:27:51 executing program 5: [ 3150.010654][ T27] audit: type=1400 audit(1576384070.459:90650): avc: denied { map } for pid=2567 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3150.181885][ T27] audit: type=1400 audit(1576384070.459:90651): avc: denied { map } for pid=2578 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3150.338798][ T27] audit: type=1400 audit(1576384070.529:90652): avc: denied { map } for pid=2567 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3150.516929][ T27] audit: type=1400 audit(1576384070.549:90653): avc: denied { map } for pid=2567 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:52 executing program 3: 04:27:52 executing program 1: 04:27:52 executing program 4: 04:27:52 executing program 2: 04:27:52 executing program 5: 04:27:52 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, 0xffffffffffffffff) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:53 executing program 3: 04:27:53 executing program 1: 04:27:53 executing program 4: 04:27:53 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, 0x0) 04:27:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x8, 0x4) syz_open_procfs(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8050}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de154bd8b44717e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x10}, 0x8000000200036158, 0x800007b, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) write$binfmt_aout(r0, &(0x7f00000003c0)={{0x108, 0x4, 0x0, 0xe2, 0x2fd, 0x0, 0x206, 0xb18}, "a00c0df310f9ca0d1d155dbf098e736d242da1f0932a3c2c9e88cc2db5a811e488634f2af3ee89c2795e263b7bd38cece2a4d6843895b886b89ddb869d48fb156cc44cb3df2d729b4e91f4cf1eeb1b4f82875d95d46e6abeedd5e5dc1cdcb64d0edc5ad73c6b552147d58f56fa28a208ed790aa5f587a380bc", [[], []]}, 0x299) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:27:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)='U', 0x1}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d01a32b5d4d26b012d5763340bebd3fc37f86adfa6188", 0x5a}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 04:27:54 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bind(0xffffffffffffffff, &(0x7f0000000b80)=@xdp={0x2c, 0x6}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x3dc, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffe57f00002005ffffa6fffff7", @ANYRES32=r4, @ANYBLOB="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"], 0x3}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x14) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:27:54 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000002e00070500"/20, @ANYRES32=r4, @ANYBLOB="0000ffff0000ffff000000000cb40100677265640000000004000200"], 0x34}}, 0x0) 04:27:54 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:55 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) epoll_create1(0x0) pipe(0x0) socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x0, 0x0}, 0x10) clock_gettime(0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 3153.911911][ T27] kauditd_printk_skb: 141 callbacks suppressed [ 3153.911926][ T27] audit: type=1400 audit(1576384075.368:90795): avc: denied { map } for pid=3091 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x101) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x140, r3, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff0d52}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2a}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x9, @rand_addr="78cbe45fa49513814653b1068f2de43c", 0xc119}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffbff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8af8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x80}, 0xbf48a778e043bfc8) 04:27:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x8, 0x4) inotify_init() r0 = syz_open_procfs(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), 0x1, 0x0, 0x0, 0x8050}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de154bd8b44717e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x10}, 0x8000000200036158, 0x800007b, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x818f492baf681a2c) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) write$binfmt_aout(r1, &(0x7f00000003c0)={{0x108, 0x4, 0x0, 0xe2, 0x2fd, 0x0, 0x206, 0xb18}, "a00c0df310f9ca0d1d155dbf098e736d242da1f0932a3c2c9e88cc2db5a811e488634f2af3ee89c2795e263b7bd38cece2a4d6843895b886b89ddb869d48fb156cc44cb3df2d729b4e91f4cf1eeb1b4f82875d95d46e6abeedd5e5dc1cdcb64d0edc5ad73c6b552147d58f56fa28a208ed790aa5f587a380bc80addc780ad5040a", [[], []]}, 0x2a1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 3154.125063][ T27] audit: type=1400 audit(1576384075.418:90796): avc: denied { map } for pid=3090 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3154.337555][ T27] audit: type=1400 audit(1576384075.428:90797): avc: denied { map } for pid=3091 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3154.393178][ T1598] block nbd0: Receive control failed (result -107) [ 3154.393185][T29650] block nbd0: Receive control failed (result -107) [ 3154.432703][ T3230] block nbd0: shutting down sockets [ 3154.457692][ T27] audit: type=1400 audit(1576384075.448:90798): avc: denied { map } for pid=3090 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3154.484188][ T27] audit: type=1400 audit(1576384075.487:90799): avc: denied { map } for pid=3091 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:56 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) [ 3154.612096][ T27] audit: type=1400 audit(1576384075.507:90800): avc: denied { map } for pid=3091 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3154.849469][ T27] audit: type=1400 audit(1576384075.567:90801): avc: denied { map } for pid=3264 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, 0x0, 0x0) [ 3155.102817][ T27] audit: type=1400 audit(1576384075.567:90802): avc: denied { map } for pid=3264 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3155.271546][ T27] audit: type=1400 audit(1576384075.567:90803): avc: denied { map } for pid=3248 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:56 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) connect$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) [ 3155.475888][ T27] audit: type=1400 audit(1576384075.576:90804): avc: denied { map } for pid=3248 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:27:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x8004, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) [ 3156.120980][ T1598] block nbd0: Receive control failed (result -107) [ 3156.131081][ T1598] block nbd0: Receive control failed (result -107) [ 3156.144044][ T3639] block nbd0: shutting down sockets 04:27:57 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:57 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) open(0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) lstat(&(0x7f0000002780)='./file0/file1\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 04:27:58 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:27:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/bsg\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x1, 0x0) [ 3157.618394][ T1598] block nbd0: Receive control failed (result -107) [ 3157.618400][T29650] block nbd0: Receive control failed (result -107) [ 3157.637150][ T4084] block nbd0: shutting down sockets 04:27:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'tgr192-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000046c0)=[{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000007c0)="0c3a31a606ab09044b7831f5bacbdd591b56aa54c6cecab629769c6a543f740f227918f536479c929f82814a852aa61a87bc06a39394a39cc9e1b9cc10a86fb3016493a1fd2a74fb2c9ecb5aaa807eb65875f873281246ae83829059f490447057d5adf15f809d149b2ecbaf3fc9b8b771310952530f0f0f5ba984023402f886", 0x80}], 0x1}], 0x1, 0x0) 04:27:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x4) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) semget(0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000100)) io_setup(0x3b24, 0x0) io_submit(0x0, 0x0, 0x0) io_cancel(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff86}, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x1000, r2, &(0x7f0000000500)="353536cd6a58bf4800ed680d41384af6b9794ccc6d63deb36ac763f62343dc0e4223519a0783750188b60d8e28a13adce3537906d69ed9519ab8530154637f3bfea5086fb48f7a4548b6a045d6bf80cd5925cf2e51c1fbdb0928a1d131e6e8a3b743d379355ef8a6c03513d7be0c50f8d2d552d4932cd96d5e4016963d81902156a266e0e10e948e5714ca836615b259b7feddbd4b745977baee247e8a8e21fee72e2582b38fb6f3344deda4e87a28df5215e02500b98a3a8e888b73d96cdbe1aadc451fd0b85ed928ea339d37e35a9eee2ce46a6c92f98f98120ae741ad549102174e46ca0e9c85c897cd91d4a3b63c6c305fa2", 0xf4}, &(0x7f0000000200)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x1, 0x1000, 0x0, 0x4c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) read$alg(0xffffffffffffffff, &(0x7f00000009c0)=""/240, 0xf0) timerfd_create(0x1, 0x80800) 04:27:59 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) [ 3157.851225][ T1598] block nbd2: Receive control failed (result -107) [ 3157.851288][T29650] block nbd2: Receive control failed (result -107) [ 3157.889368][ T4066] block nbd2: shutting down sockets 04:27:59 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) lstat(&(0x7f0000002780)='./file0/file1\x00', &(0x7f00000027c0)) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$drirender128(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) 04:28:00 executing program 4: syz_emit_ethernet(0xe, &(0x7f0000000240)={@empty, @remote, [], {@mpls_uc}}, 0x0) [ 3158.920409][ T4370] block nbd0: server does not support multiple connections per device. [ 3158.991411][ T27] kauditd_printk_skb: 141 callbacks suppressed [ 3158.991423][ T27] audit: type=1400 audit(1576384080.406:90946): avc: denied { map } for pid=4374 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3158.997198][ T4333] block nbd0: shutting down sockets [ 3159.021090][ T27] audit: type=1400 audit(1576384080.436:90947): avc: denied { map } for pid=4352 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3159.021124][ T27] audit: type=1400 audit(1576384080.436:90948): avc: denied { map } for pid=4352 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:00 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) [ 3159.033275][ T27] audit: type=1400 audit(1576384080.446:90949): avc: denied { map } for pid=4352 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:00 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) socket(0x10, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x2) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast1, @local, @local}, 0xc) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, 0x0, &(0x7f0000000200)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x40000) [ 3159.540751][ T27] audit: type=1400 audit(1576384080.466:90950): avc: denied { map } for pid=4347 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3159.703280][ T27] audit: type=1400 audit(1576384080.466:90951): avc: denied { map } for pid=4347 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$unix(r0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 3159.913350][ T27] audit: type=1400 audit(1576384080.535:90952): avc: denied { map } for pid=4374 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:01 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x0, 0x0) [ 3160.063947][ T27] audit: type=1400 audit(1576384080.555:90953): avc: denied { map } for pid=4374 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:01 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x35}}, &(0x7f0000000140)='Q7\\$', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, r0, 0x11}, 0x10) [ 3160.235853][ T27] audit: type=1400 audit(1576384080.565:90954): avc: denied { map } for pid=4347 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3160.398162][ T27] audit: type=1400 audit(1576384080.565:90955): avc: denied { map } for pid=4352 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:02 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:02 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:02 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000f00)="b2", 0x1) 04:28:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x4, [0xc0010058], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) 04:28:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x4) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) semget(0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000100)) io_setup(0x3b24, &(0x7f0000000740)=0x0) io_submit(r4, 0x0, 0x0) io_cancel(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x1000, r2, &(0x7f0000000500)="353536cd6a58bf4800ed680d41384af6b9794ccc6d63deb36ac763f62343dc0e4223519a0783750188b60d8e28a13adce3537906d69ed9519ab8530154637f3bfea5086fb48f7a4548b6a045d6bf80cd5925cf2e51c1fbdb0928a1d131e6e8a3b743d379355ef8a6c03513d7be0c50f8d2d552d4932cd96d5e4016963d81902156a266e0e10e948e5714ca836615b259b7feddbd4b745977baee247e8a8e21fee72e2582b38fb6f3344deda4e87a28df5215e02500b98a3a8e888b73d96cdbe1aadc451fd0b85ed928ea339d37e35a9eee2ce46a6c92f98f98120ae741ad549102174e46ca0e9c85c897cd91d4a3b63c6c305fa2", 0xf4, 0x10000, 0x0, 0x1}, &(0x7f0000000200)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x1, 0x1000, 0x0, 0x4c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) read$alg(0xffffffffffffffff, &(0x7f00000009c0)=""/240, 0xf0) [ 3162.042154][ T5255] block nbd0: server does not support multiple connections per device. [ 3162.054754][ T1598] block nbd2: Receive control failed (result -107) [ 3162.063303][T29650] block nbd2: Receive control failed (result -107) [ 3162.080081][ T5176] block nbd2: shutting down sockets [ 3162.091583][ T5201] block nbd0: shutting down sockets 04:28:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x6b) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="180000003200050ad22780648c6394fb0124fc0010000b40", 0x18}], 0x1}, 0x0) 04:28:03 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:03 executing program 0: ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x3ff) r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r4) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 04:28:03 executing program 4: faccessat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x5, 0x1100) [ 3163.113984][ T5377] openvswitch: netlink: Flow key attr not present in new flow. 04:28:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)=""/121, 0x79}, {0x0}, {0x0}], 0x3}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)=""/180, 0xb4}, {0x0}], 0x2}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xd051, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) ppoll(&(0x7f0000000600)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 04:28:04 executing program 0: ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x3ff) r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r4) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) [ 3163.500530][T29650] block nbd2: Receive control failed (result -107) [ 3163.515466][T29650] block nbd2: Receive control failed (result -107) [ 3163.530505][ T5324] block nbd2: shutting down sockets 04:28:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) faccessat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc4, 0x24880ad4703aed17) 04:28:05 executing program 4: mlockall(0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x67faf42d5e4f3ace}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000001200)='/dev/vcsa#\x00', 0x1, 0x102) fcntl$setstatus(r2, 0x4, 0x2000) read$alg(r2, &(0x7f0000000000)=""/200, 0xc8) r3 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600), 0x0) sendfile(r4, r5, 0x0, 0x12000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f0000000200)={{0x1, 0x0, @identifier="11871125300886dbb40752969a589925"}}) socket$inet6(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040), 0x15f, 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x3f, &(0x7f0000000140), &(0x7f0000000180)=0x4) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x4) 04:28:05 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) socket(0x2, 0x1, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:05 executing program 3: [ 3164.053792][ T27] kauditd_printk_skb: 135 callbacks suppressed [ 3164.053807][ T27] audit: type=1400 audit(1576384085.424:91091): avc: denied { map } for pid=5511 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3164.268815][ T27] audit: type=1400 audit(1576384085.424:91092): avc: denied { map } for pid=5511 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3164.440241][ T27] audit: type=1400 audit(1576384085.474:91093): avc: denied { map } for pid=5520 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3164.601772][ T27] audit: type=1400 audit(1576384085.553:91094): avc: denied { map } for pid=5520 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:06 executing program 0: ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x3ff) r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r4) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) [ 3164.776867][ T27] audit: type=1400 audit(1576384085.553:91095): avc: denied { map } for pid=5520 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:06 executing program 3: 04:28:06 executing program 1: [ 3164.907267][ T27] audit: type=1400 audit(1576384085.553:91096): avc: denied { map } for pid=5520 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3165.038281][ T27] audit: type=1400 audit(1576384085.612:91097): avc: denied { map } for pid=5520 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3165.067916][ T27] audit: type=1400 audit(1576384085.692:91098): avc: denied { map } for pid=5520 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3165.095256][ T27] audit: type=1400 audit(1576384085.692:91099): avc: denied { map } for pid=5520 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3165.182092][ T27] audit: type=1400 audit(1576384085.751:91100): avc: denied { map } for pid=5520 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3165.280739][T29650] block nbd2: Receive control failed (result -107) [ 3165.319932][ T5538] block nbd2: shutting down sockets 04:28:06 executing program 5: 04:28:06 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) socket(0x2, 0x1, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:07 executing program 3: 04:28:07 executing program 0: r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:07 executing program 1: 04:28:07 executing program 5: [ 3166.560401][T29650] block nbd2: Receive control failed (result -107) [ 3166.612580][ T5696] block nbd2: shutting down sockets 04:28:08 executing program 4: 04:28:08 executing program 1: 04:28:08 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) socket(0x2, 0x1, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:08 executing program 3: 04:28:08 executing program 0: r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:08 executing program 5: 04:28:09 executing program 3: [ 3167.769307][T29650] block nbd2: Receive control failed (result -107) [ 3167.780490][ T5757] block nbd2: shutting down sockets 04:28:09 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:09 executing program 4: 04:28:09 executing program 1: 04:28:09 executing program 0: r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:09 executing program 5: 04:28:10 executing program 3: [ 3169.109632][ T27] kauditd_printk_skb: 136 callbacks suppressed [ 3169.109645][ T27] audit: type=1400 audit(1576384090.442:91237): avc: denied { map } for pid=5782 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:10 executing program 4: 04:28:10 executing program 5: [ 3169.276979][ T27] audit: type=1400 audit(1576384090.442:91238): avc: denied { map } for pid=5782 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:10 executing program 1: 04:28:10 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) [ 3169.450544][ T27] audit: type=1400 audit(1576384090.442:91239): avc: denied { map } for pid=5782 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3169.623229][ T27] audit: type=1400 audit(1576384090.442:91240): avc: denied { watch } for pid=11812 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:28:11 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:11 executing program 3: [ 3169.794691][ T27] audit: type=1400 audit(1576384090.521:91241): avc: denied { map } for pid=5782 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3169.986348][ T27] audit: type=1400 audit(1576384090.601:91242): avc: denied { map } for pid=5782 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:11 executing program 1: 04:28:11 executing program 4: [ 3170.189088][ T27] audit: type=1400 audit(1576384090.601:91243): avc: denied { map } for pid=5782 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:11 executing program 5: [ 3170.369498][ T27] audit: type=1400 audit(1576384090.670:91244): avc: denied { map } for pid=5782 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3170.534244][ T27] audit: type=1400 audit(1576384090.690:91245): avc: denied { map } for pid=5782 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:12 executing program 3: [ 3170.705459][ T27] audit: type=1400 audit(1576384090.720:91246): avc: denied { map } for pid=5782 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3170.925632][T29650] block nbd2: Receive control failed (result -107) [ 3170.940734][ T5890] block nbd2: shutting down sockets 04:28:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000400) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000000c0)) 04:28:12 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:12 executing program 5: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = gettid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) tkill(r0, 0x1000000000016) 04:28:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20600, 0xef38}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 04:28:12 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='memory.even]:\x93\x9f\xd18\xda\xaax5w\x151\x14GB\xb7\x1bo>\x95\x1c[\x15\xaf\xc0t]\x93\xa2H\xd2\xecK\x8ay\xa6x\xbd1\xf9\x10\x1f\x1f\xd4\xc9\xfc\rZ\xb2\xce\xdc\xae\xdb1z\xac\xc4\xb7\xde\xee\x96U#L\xf1\xdc{\xf1l^\xf8q\xacN\xf3\x01\x0e\x7fl\x91\x8c\xebW\x0f\xb2\xc7\xfb\xf5\x9a\xdb\xc4\x14\xc3H\x18\xd1r\xf4o\xc5\xee\xcd\xbdXB\xd3\x19\xc4_\xfa\x12\'\xb2\x8a_\x85\xe8\xb3h\x88\x926-\x86L\xde\xff\x1au\x133$\x13b;-T+\xf50\xb4\xb4\xd9\'\x8fkf\xd8\xc0q\x82h\xd81\xfc\x95n~\x8erp\xcc\xa1\xd8\xea\x92\x93\xd5\xb9\xc5g{\x85\xf5bk\x92\f\x98i\xe7\x16\xddJ\xc5x\xf0\xd2[J4\'b\xac\a\x15\xe09\x1eE =G\xa8\xe2\xe4\xf6J\x8e\\\xf1\x8dR\xa4\xe1e\xde\xf6\xf5\xfc\xf6\x95\xad{]\xb2\x0f\x99p%\xbe\xbd\xe6M\"!\x06\xb0$\x122yI\xf6\x1dZ\xa8\x12\xc1\x1aN\x99\x9bu\xb1Q;\xd5t\xb4\x8e\xb1Lq\x9b\xe8*.\x9dj\x172\x0f^y\x1c\x96\xcb\x1f\xb1V\xd9{\xc3\x95\xa4\x17K\xd5snI`\xb2\x87Y\xd2\xc7H\xfe\x13\xb5', 0x7a05, 0x1700) 04:28:12 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) [ 3171.926737][T29650] block nbd2: Receive control failed (result -107) [ 3171.939131][ T5999] block nbd2: shutting down sockets 04:28:13 executing program 3: socket$kcm(0x10, 0x0, 0x10) socket$kcm(0xa, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xa000000, &(0x7f0000000040)=[{&(0x7f0000000600)="4c000000120081ae08ff0c0f006b10007f03e3f70000003ff3e847071b4e0906a6bd7c495ca1f75037bf64700169381ad6e74703c48f93b8446b9bbc7a461e0900a5e54e8ff5", 0x28f}], 0x1}, 0x0) 04:28:13 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) [ 3172.461298][ T6068] block nbd0: server does not support multiple connections per device. [ 3172.537216][ T6007] block nbd0: shutting down sockets 04:28:13 executing program 1: perf_event_open(&(0x7f0000000ec0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYBLOB="040000000000800000000000"]) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000600)={r1, &(0x7f00000003c0), &(0x7f0000000540)=""/174}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0xda93790feb073fab, 0x7, 0x0, 0x0, 0xffffffffffffff58}, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x87, 0x7, 0x0, 0x0, 0x0, 0x1, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80000001, 0x7}, 0x0, 0xffffffffffffffff, r1, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x5460, 0x0) 04:28:14 executing program 4: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) syz_open_procfs(0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x2, 0x80) fdatasync(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="4c0000001200ef09fffefd956fa283b7270fd917df226c24a6008000200000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f48d947f1e128a02500c57bb79ac313e5a1174c1f5c561412", 0x64}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x9) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000100de030000feffffff3d951ff324295775bf232ad36d25579dbee4e2a6f69c45eb43d3cc9e66997da87fa44740d83f"], 0x24, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) 04:28:14 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:14 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000240), 0x6) semctl$GETZCNT(0x0, 0x3, 0xf, 0x0) [ 3173.349449][T29650] block nbd2: Receive control failed (result -107) [ 3173.360565][ T6324] block nbd2: shutting down sockets 04:28:14 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:15 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000000d0605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10971615) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 3174.163002][ T27] kauditd_printk_skb: 143 callbacks suppressed [ 3174.163016][ T27] audit: type=1400 audit(1576384095.450:91390): avc: denied { map } for pid=6453 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:15 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) [ 3174.309924][ T27] audit: type=1400 audit(1576384095.450:91391): avc: denied { map } for pid=6462 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:15 executing program 1: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000380)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7", 0x28}], 0x1}, 0x0) [ 3174.481962][ T27] audit: type=1400 audit(1576384095.450:91392): avc: denied { map } for pid=6462 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3174.618476][ T27] audit: type=1400 audit(1576384095.510:91393): avc: denied { map } for pid=6462 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3174.680939][T29650] block nbd2: Receive control failed (result -107) [ 3174.705921][ T6766] block nbd2: shutting down sockets 04:28:16 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) dup2(r3, r2) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, &(0x7f0000002f80)={0x77359400}) ioctl$VIDIOC_G_MODULATOR(r6, 0xc0445636, &(0x7f00000003c0)={0xd30, "f90e3d86524931024d953a8ac95f483e96c401f42e28677779b5dbceee8ec6ec", 0x0, 0x5, 0x0, 0x0, 0x3}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdbc}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r8, &(0x7f0000000280)=""/135, 0x74f) ioctl$EVIOCSABS3F(r6, 0x401845ff, &(0x7f0000000480)={0x5dc, 0x4, 0x0, 0x4, 0x0, 0x87c}) ioctl$IOC_PR_CLEAR(r8, 0x401070cd, &(0x7f0000000340)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) bind$tipc(0xffffffffffffffff, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x1}, 0x10) socket$can_raw(0x1d, 0x3, 0x1) 04:28:16 executing program 5: bpf$PROG_LOAD(0x11, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:28:16 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) [ 3174.897079][ T27] audit: type=1400 audit(1576384095.529:91394): avc: denied { map } for pid=6453 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3175.048274][ T27] audit: type=1400 audit(1576384095.529:91395): avc: denied { map } for pid=6462 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3175.242317][ T27] audit: type=1400 audit(1576384095.579:91396): avc: denied { map } for pid=6453 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3175.434195][ T27] audit: type=1400 audit(1576384095.589:91397): avc: denied { map } for pid=6462 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3175.614737][ T27] audit: type=1400 audit(1576384095.639:91398): avc: denied { map } for pid=6462 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3175.694558][ T6892] block nbd0: server does not support multiple connections per device. [ 3175.759074][ T6866] block nbd0: shutting down sockets [ 3175.838332][ T27] audit: type=1400 audit(1576384095.648:91399): avc: denied { map } for pid=6453 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:17 executing program 5: perf_event_open(&(0x7f0000000ec0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYBLOB="040000000000"]) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:28:17 executing program 4: write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0xe, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 04:28:17 executing program 3: r0 = gettid() sigaltstack(&(0x7f000034e000/0x2000)=nil, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xf) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0) 04:28:17 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) [ 3176.151493][T29650] block nbd2: Receive control failed (result -107) [ 3176.190492][ T6928] block nbd2: shutting down sockets 04:28:17 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r2) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:17 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaf5b96a6711d4679079d00"/131], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@random={'trusted.', 'lovboxnet1mime_type{@:[\x00'}) [ 3177.538537][T29650] block nbd2: Receive control failed (result -107) [ 3177.556776][ T7210] block nbd2: shutting down sockets 04:28:18 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r2) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0x6) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000a9cff8)) socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)) 04:28:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) 04:28:19 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:19 executing program 4: write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0xe, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 04:28:19 executing program 1: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0x80, 0x0, 0xfffffe20}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_names\x00') openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000008c0), &(0x7f0000000900)=0xc) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 04:28:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) [ 3178.840211][T29650] block nbd2: Receive control failed (result -107) [ 3178.856044][ T7692] block nbd2: shutting down sockets 04:28:20 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r2) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) [ 3179.217485][ T27] kauditd_printk_skb: 136 callbacks suppressed [ 3179.217499][ T27] audit: type=1400 audit(1576384100.468:91536): avc: denied { map } for pid=7696 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3179.420848][ T27] audit: type=1400 audit(1576384100.488:91537): avc: denied { watch } for pid=11810 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3179.609002][ T27] audit: type=1400 audit(1576384100.538:91538): avc: denied { map } for pid=7697 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:21 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) 04:28:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) [ 3179.804795][ T27] audit: type=1400 audit(1576384100.557:91539): avc: denied { map } for pid=7696 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:21 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x0, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) [ 3179.959060][ T27] audit: type=1400 audit(1576384100.557:91540): avc: denied { open } for pid=7719 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 04:28:21 executing program 4: write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0xe, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 3180.102966][ T27] audit: type=1400 audit(1576384100.587:91541): avc: denied { map } for pid=7697 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3180.281041][ T27] audit: type=1400 audit(1576384100.587:91542): avc: denied { map } for pid=7697 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3180.518929][ T27] audit: type=1400 audit(1576384100.597:91543): avc: denied { map } for pid=7696 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) symlinkat(0x0, r0, 0x0) [ 3180.726794][ T27] audit: type=1400 audit(1576384100.597:91544): avc: denied { map } for pid=7696 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3180.863769][ T27] audit: type=1400 audit(1576384100.607:91545): avc: denied { kernel } for pid=7719 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 04:28:22 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) 04:28:23 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(r0, 0xffffffffffffffff, 0x0) 04:28:23 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) 04:28:23 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x0, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:23 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) 04:28:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x1) 04:28:24 executing program 3: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000080)='comm\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x2a) r2 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@remote, @in6=@mcast2, 0xfffd, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2000000}, {}, 0xfffffffc, 0x1, 0x80000000000001, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2}}, 0xe8) sendmmsg(r2, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 04:28:24 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:24 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) 04:28:24 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x0, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:25 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3184.311243][ T27] kauditd_printk_skb: 143 callbacks suppressed [ 3184.311255][ T27] audit: type=1400 audit(1576384105.516:91689): avc: denied { map } for pid=9073 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3184.514967][ T27] audit: type=1400 audit(1576384105.516:91690): avc: denied { map } for pid=9073 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:25 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) 04:28:25 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) ioctl$NBD_DO_IT(r0, 0xab03) [ 3184.694904][ T27] audit: type=1400 audit(1576384105.546:91691): avc: denied { map } for pid=9073 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:25 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x8}, 0x18c, 0x0}, 0x20008840) [ 3184.841675][ T27] audit: type=1400 audit(1576384105.565:91692): avc: denied { map } for pid=9073 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3184.964415][ T27] audit: type=1400 audit(1576384105.665:91693): avc: denied { map } for pid=9073 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3184.998538][ T9234] selinux_nlmsg_perm: 5 callbacks suppressed [ 3184.998556][ T9234] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9234 comm=syz-executor.4 [ 3185.125450][ T27] audit: type=1400 audit(1576384105.684:91694): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3185.185947][ T9234] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9234 comm=syz-executor.4 [ 3185.304210][ T27] audit: type=1400 audit(1576384105.714:91695): avc: denied { map } for pid=9073 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3185.346523][ T9234] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9234 comm=syz-executor.4 [ 3185.467019][ T9234] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9234 comm=syz-executor.4 [ 3185.488780][ T27] audit: type=1400 audit(1576384105.714:91696): avc: denied { map } for pid=9073 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:26 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) [ 3185.572107][ T9234] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9234 comm=syz-executor.4 [ 3185.646255][ T27] audit: type=1400 audit(1576384105.813:91697): avc: denied { map } for pid=9073 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:26 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) [ 3185.685604][ T9234] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9234 comm=syz-executor.4 [ 3185.782914][ T9234] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9234 comm=syz-executor.4 [ 3185.823446][ T27] audit: type=1400 audit(1576384105.813:91699): avc: denied { map } for pid=9073 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3185.866762][ T9234] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9234 comm=syz-executor.4 04:28:27 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000100)={{}, 'port1\x00'}) [ 3185.924779][ T9234] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9234 comm=syz-executor.4 [ 3186.004481][T29650] block nbd2: Receive control failed (result -107) [ 3186.012664][ T9234] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9234 comm=syz-executor.4 [ 3186.052561][ T9378] block nbd2: shutting down sockets 04:28:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) close(r0) 04:28:27 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:28 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 04:28:28 executing program 1: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0x775a6ae9}, {&(0x7f0000001480)="baa99275e2c2b1d89a688dcf20e9db572ffcea1a25e25c176fae62e3864718eec4ae1514b4277db9b91226581675d1bb2fe572be1823ee3afe7b4d785258171633b11812c45025aa49f983b176cd7835ec0db8e9eecc3e571f5ecc4d2cd78e90d3bb2fbf88d0a8e4ce6873396e6c0c563cf9d9", 0x73, 0x3f}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 3187.488202][ T9682] block nbd2: server does not support multiple connections per device. [ 3187.558323][ T9608] block nbd2: shutting down sockets 04:28:28 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) 04:28:28 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:28 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) [ 3188.452505][ T9861] XFS (loop1): Invalid superblock magic number 04:28:30 executing program 3: [ 3189.256695][ T9985] block nbd2: server does not support multiple connections per device. [ 3189.308558][ T9924] block nbd2: shutting down sockets [ 3189.371443][ T27] kauditd_printk_skb: 169 callbacks suppressed [ 3189.371458][ T27] audit: type=1400 audit(1576384110.534:91868): avc: denied { map } for pid=9946 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:30 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 04:28:30 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) [ 3189.560323][ T27] audit: type=1400 audit(1576384110.583:91869): avc: denied { map } for pid=9952 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:30 executing program 5: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) 04:28:30 executing program 1: 04:28:31 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) [ 3189.798529][ T27] audit: type=1400 audit(1576384110.583:91870): avc: denied { map } for pid=9952 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3189.982520][ T27] audit: type=1400 audit(1576384110.593:91871): avc: denied { map } for pid=9946 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3190.195150][ T27] audit: type=1400 audit(1576384110.623:91872): avc: denied { watch } for pid=11720 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:28:31 executing program 3: [ 3190.381679][ T27] audit: type=1400 audit(1576384110.693:91873): avc: denied { map } for pid=9946 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3190.478666][T10293] selinux_nlmsg_perm: 5 callbacks suppressed [ 3190.478683][T10293] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=10293 comm=syz-executor.4 [ 3190.549318][ T27] audit: type=1400 audit(1576384110.693:91874): avc: denied { map } for pid=9946 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3190.640401][T10298] block nbd2: server does not support multiple connections per device. [ 3190.640748][T10293] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=10293 comm=syz-executor.4 [ 3190.700050][T10295] block nbd2: shutting down sockets [ 3190.718330][ T27] audit: type=1400 audit(1576384110.931:91875): avc: denied { map } for pid=10288 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3190.781655][T10293] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=10293 comm=syz-executor.4 04:28:32 executing program 2: ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x3ff) r0 = socket(0x2, 0x1, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) [ 3190.877835][T10293] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=10293 comm=syz-executor.4 04:28:32 executing program 1: [ 3190.911190][ T27] audit: type=1400 audit(1576384110.931:91876): avc: denied { map } for pid=10288 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3190.993995][T10293] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=10293 comm=syz-executor.4 [ 3191.071272][ T27] audit: type=1400 audit(1576384111.000:91877): avc: denied { map } for pid=10288 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3191.113146][T10293] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=10293 comm=syz-executor.4 04:28:32 executing program 3: [ 3191.315822][T10293] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=10293 comm=syz-executor.4 [ 3191.406184][T10293] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=10293 comm=syz-executor.4 [ 3191.538855][T10293] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=10293 comm=syz-executor.4 04:28:32 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) [ 3191.627701][T10293] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=10293 comm=syz-executor.4 04:28:32 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) syz_open_dev$ndb(0x0, 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:32 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 04:28:33 executing program 1: 04:28:33 executing program 2: ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x3ff) r0 = socket(0x2, 0x1, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 04:28:33 executing program 3: 04:28:33 executing program 1: 04:28:33 executing program 2: ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x3ff) r0 = socket(0x2, 0x1, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) 04:28:34 executing program 3: 04:28:34 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 04:28:34 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) 04:28:34 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) syz_open_dev$ndb(0x0, 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:35 executing program 2: r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:35 executing program 1: 04:28:35 executing program 3: 04:28:35 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3194.423282][ T27] kauditd_printk_skb: 165 callbacks suppressed [ 3194.423298][ T27] audit: type=1400 audit(1576384115.542:92043): avc: denied { map } for pid=10739 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3194.461446][T29650] block nbd0: Receive control failed (result -107) 04:28:35 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/160, 0xa0}], 0x1, 0x0) [ 3194.480540][T29650] block nbd0: Receive control failed (result -107) [ 3194.568014][ T27] audit: type=1400 audit(1576384115.582:92044): avc: denied { watch } for pid=11812 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3194.681542][T10741] block nbd0: shutting down sockets 04:28:35 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) syz_open_dev$ndb(0x0, 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) [ 3194.829517][ T27] audit: type=1400 audit(1576384115.631:92045): avc: denied { map } for pid=10739 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3195.001166][ T27] audit: type=1400 audit(1576384115.939:92046): avc: denied { map } for pid=10747 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:36 executing program 1: 04:28:36 executing program 2: r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, 0x0, 0x0, 0x0) 04:28:36 executing program 3: [ 3195.192207][ T27] audit: type=1400 audit(1576384115.939:92047): avc: denied { map } for pid=10747 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:36 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3195.389858][ T27] audit: type=1400 audit(1576384116.028:92048): avc: denied { map } for pid=10747 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3195.568602][ T27] audit: type=1400 audit(1576384116.028:92049): avc: denied { map } for pid=10747 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3195.726958][ T27] audit: type=1400 audit(1576384116.068:92050): avc: denied { map } for pid=10747 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3195.891261][ T27] audit: type=1400 audit(1576384116.117:92051): avc: denied { map } for pid=10747 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:37 executing program 1: [ 3195.972473][T29650] block nbd0: Receive control failed (result -107) [ 3195.993414][T29650] block nbd0: Receive control failed (result -107) [ 3196.006047][T10757] block nbd0: shutting down sockets [ 3196.043349][ T27] audit: type=1400 audit(1576384116.147:92052): avc: denied { map } for pid=10747 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:37 executing program 3: 04:28:37 executing program 2: r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:37 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, 0xffffffffffffffff) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, 0x0, 0x0, 0x0) 04:28:38 executing program 1: 04:28:38 executing program 3: 04:28:38 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:38 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3197.419025][T29650] block nbd0: Receive control failed (result -107) [ 3197.429261][T29650] block nbd0: Receive control failed (result -107) [ 3197.437704][T10961] block nbd0: shutting down sockets 04:28:38 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, 0xffffffffffffffff) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) [ 3197.769371][T10993] block nbd2: server does not support multiple connections per device. [ 3197.839929][T10982] block nbd2: shutting down sockets 04:28:39 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:39 executing program 1: 04:28:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffff7}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0), 0x40000000000011e, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffff8}, 0x0) r4 = creat(&(0x7f0000000340)='./bus/file0\x00', 0x36) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="17000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYRES32=r6, @ANYBLOB="3900000900000061799e0064e2404f6cfa5afdcde5d5f01113bdbada423b1dcd873df4eb6c726da7d5f34618c6b8a40bdf37dfa04c07503c6b060c0c36"], &(0x7f0000000180)=0x41) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) socket$kcm(0x2, 0x2, 0x73) connect(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @remote}, 0x0, 0x0, 0x0, 0x3}}, 0x80) socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r8 = socket$inet6(0xa, 0x1, 0x0) listen(r8, 0x4000000043) ioctl$sock_SIOCGSKNS(r8, 0x894c, 0x0) open(0x0, 0x1c1042, 0x0) 04:28:39 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 04:28:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, 0x0, 0x0, 0x0) 04:28:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffff7}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0), 0x40000000000011e, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffff8}, 0x0) r4 = creat(&(0x7f0000000340)='./bus/file0\x00', 0x36) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="17000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYRES32=r6, @ANYBLOB="3900000900000061799e0064e2404f6cfa5afdcde5d5f01113bdbada423b1dcd873df4eb6c726da7d5f34618c6b8a40bdf37dfa04c07503c6b060c0c36"], &(0x7f0000000180)=0x41) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) connect(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @remote}, 0x0, 0x0, 0x0, 0x3}}, 0x80) socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r8 = socket$inet6(0xa, 0x1, 0x0) listen(r8, 0x4000000043) ioctl$sock_SIOCGSKNS(r8, 0x894c, 0x0) 04:28:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffff7}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0), 0x40000000000011e, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffff8}, 0x0) creat(&(0x7f0000000340)='./bus/file0\x00', 0x36) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="17000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={0x0, 0x9}, 0x8) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) socket$kcm(0x2, 0x2, 0x73) connect(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @remote}, 0x0, 0x0, 0x0, 0x3}}, 0x80) socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r6 = socket$inet6(0xa, 0x1, 0x0) listen(r6, 0x4000000043) ioctl$sock_SIOCGSKNS(r6, 0x894c, 0x0) open(0x0, 0x1c1042, 0x0) [ 3199.133084][T11135] block nbd2: server does not support multiple connections per device. [ 3199.163082][T11110] block nbd2: shutting down sockets 04:28:40 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x3ff) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:40 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, 0xffffffffffffffff) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:40 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3199.483954][ T27] kauditd_printk_skb: 120 callbacks suppressed [ 3199.483967][ T27] audit: type=1400 audit(1576384120.560:92173): avc: denied { map } for pid=11274 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, &(0x7f0000000040), 0x0, 0x0) [ 3199.688299][ T27] audit: type=1400 audit(1576384120.560:92174): avc: denied { map } for pid=11274 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3199.854218][ T27] audit: type=1400 audit(1576384120.560:92175): avc: denied { watch } for pid=11807 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=1134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:28:41 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) epoll_create1(0x0) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) pipe(&(0x7f0000001280)) socket$inet_sctp(0x2, 0x0, 0x84) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x5, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) [ 3200.000457][ T27] audit: type=1400 audit(1576384120.629:92176): avc: denied { map } for pid=11274 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3200.166796][ T27] audit: type=1400 audit(1576384120.629:92177): avc: denied { map } for pid=11274 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3200.319446][ T27] audit: type=1400 audit(1576384121.076:92178): avc: denied { watch } for pid=11812 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3200.422753][T11427] block nbd2: server does not support multiple connections per device. [ 3200.467243][ T27] audit: type=1400 audit(1576384121.155:92179): avc: denied { map } for pid=11406 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3200.486194][T11409] block nbd2: shutting down sockets [ 3200.625685][ T27] audit: type=1400 audit(1576384121.155:92180): avc: denied { map } for pid=11406 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3200.634138][T29650] block nbd0: Receive control failed (result -107) [ 3200.661612][T29650] block nbd0: Receive control failed (result -107) 04:28:41 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3200.671026][T11413] block nbd0: shutting down sockets 04:28:41 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:41 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x0, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) [ 3200.894256][ T27] audit: type=1400 audit(1576384121.155:92181): avc: denied { map } for pid=11406 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:42 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) [ 3201.066556][ T27] audit: type=1400 audit(1576384121.155:92182): avc: denied { map } for pid=11406 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, &(0x7f0000000040), 0x0, 0x0) 04:28:42 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3201.847804][T11688] block nbd2: server does not support multiple connections per device. [ 3201.937071][T11664] block nbd2: shutting down sockets 04:28:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(r0, 0x0, 0x0, 0x0, 0x0) 04:28:43 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) [ 3202.547680][T11674] block nbd0: shutting down sockets 04:28:43 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x0, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:43 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 04:28:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x1, 0x0) ioctl$SNDCTL_DSP_POST(r2, 0x8004500f, 0x713000) 04:28:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, &(0x7f0000000040), 0x0, 0x0) 04:28:44 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 04:28:45 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) r1 = socket(0x2, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@bridge_getlink={0x28, 0x12, 0x5, 0x0, 0x0, {}, [@IFLA_IF_NETNSID={0x8, 0x2e, 0x81000000}]}, 0x28}}, 0x0) [ 3204.537674][ T27] kauditd_printk_skb: 138 callbacks suppressed [ 3204.537688][ T27] audit: type=1400 audit(1576384125.578:92321): avc: denied { map } for pid=12373 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3204.653658][T12082] block nbd0: shutting down sockets [ 3204.704440][ T27] audit: type=1400 audit(1576384125.618:92322): avc: denied { map } for pid=12373 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:45 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x0, 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) [ 3204.855661][ T27] audit: type=1400 audit(1576384125.697:92323): avc: denied { map } for pid=12373 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3204.960408][T12506] selinux_nlmsg_perm: 20 callbacks suppressed [ 3204.960426][T12506] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12506 comm=syz-executor.4 04:28:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) [ 3205.027747][ T27] audit: type=1400 audit(1576384125.727:92324): avc: denied { map } for pid=12373 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3205.116204][T12506] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12506 comm=syz-executor.4 04:28:46 executing program 3: syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='uid=', @ANYRESHEX]) [ 3205.210513][T12506] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12506 comm=syz-executor.4 [ 3205.259017][ T27] audit: type=1400 audit(1576384125.727:92325): avc: denied { map } for pid=12373 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3205.351746][T12506] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12506 comm=syz-executor.4 [ 3205.421899][ T27] audit: type=1400 audit(1576384125.786:92326): avc: denied { map } for pid=12373 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3205.485765][T12506] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12506 comm=syz-executor.4 [ 3205.578094][T12506] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12506 comm=syz-executor.4 [ 3205.622609][ T27] audit: type=1400 audit(1576384125.786:92327): avc: denied { map } for pid=12373 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0xc080aebe, &(0x7f0000000380)={0xcddc314ed9fa4468}) [ 3205.701047][T12506] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12506 comm=syz-executor.4 [ 3205.744473][T12506] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12506 comm=syz-executor.4 [ 3205.810662][ T27] audit: type=1400 audit(1576384125.856:92328): avc: denied { map } for pid=12373 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3205.855639][T12506] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12506 comm=syz-executor.4 [ 3205.920286][T12506] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12506 comm=syz-executor.4 [ 3206.015596][ T27] audit: type=1400 audit(1576384125.925:92329): avc: denied { map } for pid=12373 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:47 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x0, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:47 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3206.143340][ T27] audit: type=1400 audit(1576384125.985:92330): avc: denied { watch } for pid=11720 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 04:28:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000000)) 04:28:47 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) 04:28:48 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 04:28:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_triestat\x00') ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000000)) 04:28:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0xc080aebe, &(0x7f0000000380)={0xcddc314ed9fa4468}) 04:28:49 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x0, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:49 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') preadv(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) [ 3208.449302][T12942] block nbd0: shutting down sockets 04:28:49 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffff7}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0), 0x40000000000011e, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffff8}, 0x0) creat(&(0x7f0000000340)='./bus/file0\x00', 0x36) socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r7) dup2(r4, r6) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r5, 0x8983, &(0x7f00000000c0)={0x0, 'bond0\x00', {0x1}, 0x4}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) r8 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x6100) ftruncate(r8, 0x8200) write$cgroup_type(r8, &(0x7f0000000200)='\x00\x02readed\x80', 0xffffffad) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}, 0x0, 0x0, 0x9}, r9, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) socket$kcm(0x2, 0x2, 0x73) connect(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @remote}}}, 0x80) socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r10 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r10, 0x4000000043) ioctl$sock_SIOCGSKNS(r10, 0x894c, 0x0) open(0x0, 0x1c1042, 0x0) 04:28:49 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3209.601194][ T27] kauditd_printk_skb: 155 callbacks suppressed [ 3209.601209][ T27] audit: type=1400 audit(1576384130.596:92486): avc: denied { map } for pid=13263 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:50 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3209.841658][ T27] audit: type=1400 audit(1576384130.695:92487): avc: denied { map } for pid=13289 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:50 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) [ 3210.116528][ T27] audit: type=1400 audit(1576384130.705:92488): avc: denied { map } for pid=13263 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0xc080aebe, &(0x7f0000000380)={0xcddc314ed9fa4468}) [ 3210.323417][ T27] audit: type=1400 audit(1576384130.715:92489): avc: denied { map } for pid=13280 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:51 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x0, 0x1, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:51 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffff7}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{&(0x7f0000002ec0)=@nfc_llcp, 0x80, &(0x7f0000000480)=[{0x0}, {&(0x7f00000030c0)=""/207, 0xcf}], 0x2}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) creat(&(0x7f0000000340)='./bus/file0\x00', 0x36) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xfffffffffffffeb2, 0x10400003) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x9) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r5 = socket$kcm(0x2, 0x0, 0x73) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r5, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @remote}}}, 0x80) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) socket$inet_udplite(0x2, 0x2, 0x88) r7 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000180)=0xc) r8 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getsockname(r8, 0x0, &(0x7f0000000300)) open(&(0x7f0000000000)='./bus\x00', 0x1c1042, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4) r9 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_flowlabel\x00') r10 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="012a00ad", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r9, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=r11, @ANYBLOB="ff0f0600008000005d1e1f00f40009000973f5d1c7dc25c1bc56"], &(0x7f0000000340)=0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)=ANY=[], &(0x7f0000000340)) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000440)={0x0, 0x8000}, 0x8) [ 3210.532876][ T27] audit: type=1400 audit(1576384130.715:92490): avc: denied { map } for pid=13280 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3210.625518][T13262] block nbd0: shutting down sockets 04:28:51 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) r4 = socket(0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) r5 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r5) ioctl$NBD_DO_IT(r0, 0xab03) [ 3210.717098][ T27] audit: type=1400 audit(1576384130.725:92491): avc: denied { map } for pid=13289 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3210.916488][ T27] audit: type=1400 audit(1576384130.725:92492): avc: denied { map } for pid=13289 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3211.103773][ T27] audit: type=1400 audit(1576384130.725:92493): avc: denied { map } for pid=13289 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3211.288876][ T27] audit: type=1400 audit(1576384130.745:92494): avc: denied { map } for pid=13263 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3211.291854][T13769] selinux_nlmsg_perm: 50 callbacks suppressed [ 3211.291871][T13769] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13769 comm=syz-executor.4 [ 3211.431839][T13769] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13769 comm=syz-executor.4 [ 3211.469841][ T27] audit: type=1400 audit(1576384130.745:92495): avc: denied { map } for pid=13263 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3211.617703][T13769] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13769 comm=syz-executor.4 04:28:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x22, 0x829, 0x0, 0x0, {0x1, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) [ 3211.784717][T13769] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13769 comm=syz-executor.4 [ 3211.855448][T13769] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13769 comm=syz-executor.4 [ 3211.917591][T13769] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13769 comm=syz-executor.4 04:28:53 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) [ 3212.036006][T13769] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13769 comm=syz-executor.4 [ 3212.139693][T13769] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13769 comm=syz-executor.4 [ 3212.249664][T13769] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13769 comm=syz-executor.4 04:28:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0xc080aebe, &(0x7f0000000380)={0xcddc314ed9fa4468}) [ 3212.377199][T13769] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13769 comm=syz-executor.4 04:28:53 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x0, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:53 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3212.653829][T13820] block nbd0: shutting down sockets 04:28:53 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 04:28:54 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 04:28:54 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3213.889727][T29650] block nbd0: Receive control failed (result -107) [ 3213.902058][T29650] block nbd0: Receive control failed (result -107) [ 3213.922762][T14496] block nbd0: shutting down sockets 04:28:55 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:55 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x0, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:55 executing program 1: [ 3214.734314][ T27] kauditd_printk_skb: 170 callbacks suppressed [ 3214.734329][ T27] audit: type=1400 audit(1576384135.683:92657): avc: denied { watch } for pid=11717 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=22910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3214.949657][ T27] audit: type=1400 audit(1576384135.693:92658): avc: denied { watch } for pid=11720 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=1136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3215.122252][T29650] block nbd0: Receive control failed (result -107) [ 3215.132414][ T1598] block nbd0: Receive control failed (result -107) [ 3215.162937][T29650] block nbd0: shutting down sockets [ 3215.172114][T29650] [ 3215.174486][T29650] ============================================ [ 3215.180661][T29650] WARNING: possible recursive locking detected [ 3215.186817][T29650] 5.5.0-rc1-syzkaller #0 Not tainted [ 3215.192204][T29650] -------------------------------------------- [ 3215.198402][T29650] kworker/u5:2/29650 is trying to acquire lock: [ 3215.204650][T29650] ffff88809125e128 ((wq_completion)knbd0-recv){+.+.}, at: flush_workqueue+0xf7/0x14c0 [ 3215.214303][T29650] [ 3215.214303][T29650] but task is already holding lock: [ 3215.222113][T29650] ffff88809125e128 ((wq_completion)knbd0-recv){+.+.}, at: process_one_work+0x88b/0x1740 [ 3215.232290][T29650] [ 3215.232290][T29650] other info that might help us debug this: [ 3215.240348][T29650] Possible unsafe locking scenario: [ 3215.240348][T29650] [ 3215.247805][T29650] CPU0 [ 3215.251099][T29650] ---- 04:28:56 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r3) r4 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_DO_IT(r0, 0xab03) [ 3215.253158][ T27] audit: type=1400 audit(1576384135.941:92659): avc: denied { map } for pid=14751 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3215.254401][T29650] lock((wq_completion)knbd0-recv); [ 3215.283220][T29650] lock((wq_completion)knbd0-recv); [ 3215.288596][T29650] [ 3215.288596][T29650] *** DEADLOCK *** [ 3215.288596][T29650] [ 3215.296832][T29650] May be due to missing lock nesting notation [ 3215.296832][T29650] [ 3215.305513][T29650] 3 locks held by kworker/u5:2/29650: [ 3215.310879][T29650] #0: ffff88809125e128 ((wq_completion)knbd0-recv){+.+.}, at: process_one_work+0x88b/0x1740 [ 3215.321163][T29650] #1: ffffc90001bd7dc0 ((work_completion)(&args->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 3215.331786][T29650] #2: ffff8882184e8d78 (&nbd->config_lock){+.+.}, at: refcount_dec_and_mutex_lock+0x55/0xe0 [ 3215.342581][T29650] [ 3215.342581][T29650] stack backtrace: [ 3215.348505][T29650] CPU: 0 PID: 29650 Comm: kworker/u5:2 Not tainted 5.5.0-rc1-syzkaller #0 [ 3215.357003][T29650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3215.367137][T29650] Workqueue: knbd0-recv recv_work [ 3215.372162][T29650] Call Trace: [ 3215.375483][T29650] dump_stack+0x197/0x210 [ 3215.379843][T29650] __lock_acquire.cold+0x15d/0x385 [ 3215.384971][T29650] ? mark_held_locks+0xf0/0xf0 [ 3215.389742][T29650] lock_acquire+0x190/0x410 [ 3215.394421][T29650] ? flush_workqueue+0xf7/0x14c0 [ 3215.399371][T29650] flush_workqueue+0x126/0x14c0 [ 3215.404234][T29650] ? flush_workqueue+0xf7/0x14c0 [ 3215.409194][T29650] ? lock_downgrade+0x920/0x920 04:28:56 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3215.414047][T29650] ? drain_workqueue+0x2b/0x3d0 [ 3215.418922][T29650] ? find_held_lock+0x35/0x130 [ 3215.423842][T29650] ? pwq_unbound_release_workfn+0x2f0/0x2f0 [ 3215.430017][T29650] drain_workqueue+0x1b4/0x3d0 [ 3215.434948][T29650] ? drain_workqueue+0x1b4/0x3d0 [ 3215.439992][T29650] ? kfree+0x226/0x2c0 [ 3215.444074][T29650] destroy_workqueue+0x80/0x700 [ 3215.448944][T29650] nbd_config_put+0x3dd/0x870 [ 3215.453647][T29650] recv_work+0x19b/0x200 [ 3215.457898][T29650] process_one_work+0x9af/0x1740 [ 3215.463369][T29650] ? pwq_dec_nr_in_flight+0x320/0x320 [ 3215.468744][T29650] ? lock_acquire+0x190/0x410 [ 3215.473433][T29650] worker_thread+0x98/0xe40 [ 3215.478073][T29650] ? trace_hardirqs_on+0x67/0x240 [ 3215.483117][T29650] kthread+0x361/0x430 [ 3215.487197][T29650] ? process_one_work+0x1740/0x1740 [ 3215.492943][T29650] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 3215.498794][T29650] ret_from_fork+0x24/0x30 04:28:56 executing program 3: [ 3215.506046][ T27] audit: type=1400 audit(1576384135.941:92660): avc: denied { map } for pid=14751 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3215.529502][ T27] audit: type=1400 audit(1576384135.991:92661): avc: denied { map } for pid=14751 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:56 executing program 1: [ 3215.557784][ T27] audit: type=1400 audit(1576384136.021:92662): avc: denied { watch } for pid=12236 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=1137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 3215.621627][ T27] audit: type=1400 audit(1576384136.040:92663): avc: denied { map } for pid=14751 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3215.660949][ T4090] kobject: 'loop4' (0000000008c33a16): kobject_uevent_env [ 3215.737369][ T4090] kobject: 'loop4' (0000000008c33a16): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3215.759568][ T27] audit: type=1400 audit(1576384136.080:92664): avc: denied { map } for pid=14751 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:56 executing program 3: [ 3215.917487][ T27] audit: type=1400 audit(1576384136.130:92665): avc: denied { map } for pid=14751 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:28:57 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x0, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) [ 3216.069138][ T27] audit: type=1400 audit(1576384136.130:92666): avc: denied { map } for pid=14751 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3216.214148][ T4090] kobject: 'loop2' (00000000d3529aea): kobject_uevent_env [ 3216.257674][ T4090] kobject: 'loop2' (00000000d3529aea): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:28:57 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) r1 = socket(0x2, 0x0, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:57 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 04:28:57 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 04:28:57 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) socket(0x2, 0x1, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_DO_IT(r0, 0xab03) [ 3216.500403][ T4090] kobject: 'loop1' (0000000028cd768c): kobject_uevent_env [ 3216.534406][ T4090] kobject: 'loop1' (0000000028cd768c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3216.576517][T15178] selinux_nlmsg_perm: 50 callbacks suppressed [ 3216.576532][T15178] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15178 comm=syz-executor.4 [ 3216.634046][ T4090] kobject: 'loop5' (0000000073de3ba9): kobject_uevent_env [ 3216.668156][ T4090] kobject: 'loop5' (0000000073de3ba9): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3216.691269][T15178] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15178 comm=syz-executor.4 [ 3216.706483][T15197] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15197 comm=syz-executor.1 [ 3216.748759][T15178] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15178 comm=syz-executor.4 [ 3216.765838][T15178] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15178 comm=syz-executor.4 [ 3216.781324][T15197] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15197 comm=syz-executor.1 [ 3216.832055][T15178] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15178 comm=syz-executor.4 [ 3216.867926][T15197] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15197 comm=syz-executor.1 [ 3216.893662][T15178] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15178 comm=syz-executor.4 [ 3216.927271][T15197] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15197 comm=syz-executor.1 04:28:57 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x3ff) socket(0x2, 0x1, 0x0) r1 = syz_open_dev$ndb(0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_DO_IT(r0, 0xab03) 04:28:57 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f450073117f0cd1d61e36b9e8ea"], 0xe) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="8bf7c66359b65f9dc749207edba688c8b0d150ad77e556237d5439179d12f771d67dcc2f6354d5dc4820b70e24a13f475ef2c4d99bb650d50c500f6786f7f6076cf36faa4dd65253ce12c152112de109d442a05d1f5d4f217c738a7917a70de179eadb2a557b5bb98543207631de304fac2d07fdbe5eb4842b378f41aab0307c52f8b3367d200305988382", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESDEC=0x0, @ANYPTR64, @ANYBLOB="580300", @ANYBLOB="076a341ae67b28de78cde7280f42e91e6e81382ef8dfa7baed6ca47bf5c9a2d6bfa6512fa5689f2ef69e6eeaf4cbc22dd51ed791d3799ee57de9243b839c40c44516d9336752859e4045c462425fdb7656c3eb0ff2eb5d760f52a2975f04678a565960269f2a5e534e9e9ef0110bd0537a60fe0a0e2add44012f37638d9a858b49a2adb2acfa36deaed4b8f4364e2c22a3c6edbd8d0ca3262173159b0283812d88b0a7512b7fc597962b7ebd113dfd59d3a2cad8cba491ce21b9681b3d097682e0da1cb1744853a3ee210f074584bcfc17", @ANYRES16, @ANYRES32=0x0], @ANYRES32]], 0xff15) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 3217.171222][ T4090] kobject: 'loop4' (0000000008c33a16): kobject_uevent_env [ 3217.208858][ T4090] kobject: 'loop4' (0000000008c33a16): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3217.370216][ T4090] kobject: 'loop1' (0000000028cd768c): kobject_uevent_env [ 3217.389946][ T4090] kobject: 'loop1' (0000000028cd768c): fill_kobj_path: path = '/devices/virtual/block/loop1'