a2b1503e2dc29e51548c56e63c45c27d1832bde264769e15efeccbe830252669537e6670afe870073b3b4e687d120f6b0cd673acfae4", 0xa0}, {&(0x7f0000000ac0)="40cbd54ab4b270820d22e03c2ce1da854897b58ed62063feffaed44c3d8f68511bd12b5176c92948e79abfd5f8f0c24197b886678e63a0283314c8a53d71d7aa48f59c4e0e0d6e13895f0f58c05bf97b8d86d37f088f6578fcb12e6efdec4d", 0x5f}, {&(0x7f0000000b40)="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", 0x1000}, {&(0x7f0000001b40)="f2d37d3d1a59c5466656aa638a12645ea38dfd4ae2", 0x15}], 0x8, &(0x7f0000001c00)=[{0xf8, 0x29, 0xfff, "b530b3d414822a7a81e5b1e922cb284ede4b44d60a5ede1cc093330f257b8f54b3856183aedff9b9ab59e7e83bb42ea7232a247628e6eebaf56a87e78f504ab11777eed195d126499510f809e90f260c914684c18d115f7848bc51dfa40bec50a91565881e9b921d527f6cc4fbcc19b4ca5989290c4972374c0a6f21dd11cfa8deb14ccef039079708ec53290fb602beb8a32edb967bf3312a360b5d1cefc9df0207668e0fca7d2dd008e6b26a808c0ec89ad2edb9ceaf50220ba96ae64a38442315cc2ee3749c9f5ac4c59a3c2285c9fee6f3589ebc779c16cb8ebd9bf1491fbc9202bfe5"}, {0x40, 0x11e, 0x20, "3e5ce700e89d30034817a226f78555a0298ef926bfb1b0fbfb4f7ee751ba8fa7c062f50fb45eeaa3bc4b7466de8a72"}, {0xc8, 0x119, 0x10001, "056f581fd5d161d7175f337bc6eae74c94d062b123dc94d3a5cbadd7f7ef9461109dc310190f8a721e27f9c3b86edfd5db9a93a878ffb8a7bd326f604a6eabb43a8a250832daedb2650e87cbffcbf0df8afe6e5476f5033b8940178545218ed7c04c7faccfeddadc65de722de7a674ef17a1f315d2b501bd3a859846e7a885c35d4f18035423b1de5185351e35bc4a7aca2056cf2dcb20ee034ea41a0f86d770f9a6a5089afbcb095faefce7d44471aeb6baf6803bb3"}, {0x1010, 0x116, 0x1000, "134e4c3ed01473c756f6a4af0f13d23c35b9f13e3b4fe502222e29e91a15b23986df21c46002a75ad876029582d694414e78e4231f58f893650507174b11d90119ff40762c04781442d241d85dabc91c5b1abba9e736bf7aa55d7e5eeb541ed8606e79820cfbbf3c16b06208aac4a8e33a1745f5caf8ac3d4776d70ffd44ea34bab7533cac0fdd234c8623e5abf159933444d06219c3286794b5abf6234218c578b863befedc938bd3f22efd33f323a8e79615bcc8f7c4eb8beb04736c670200771a3cd22494a5c926d5415c4d31a45eef6d6b83c1e8adaa6a390077bee657c33c57a2d99cecfeffd2f683cc5b55c8a9013eadf4ee25dabf616db48b0220072aaaeb20b64611a31cae6a54c64ec6b0d712401f5424837ef45464bf3e82fdcda1ec86dbfce7a536303b66523fb549f927d5253ae68afb3fc9e0a275e888db7551b8eb8fafb2dcf3eadc84c29a1a0bf75493c8cbdf35b572516c573ce5ac8cea26045c0359daeb7ed61dcc5403b48b7dadd1872d2a3307f60ebbfd021d9752840bd84acca4e06eb4f8b2ad546182921095c1553f759fce7f3327098b096861f6c9eb5319a2c3f0db889b0f7c95de70d6e9272adc4053d1815e39abe91e919403c16cf7af24463a16ebe44fa3725341439d9320933b8bcc51d8388620b007016c2e84f89f4570734dbb323638cb689d70553291ce98dcd7753e17583ba55a33161428ad0e9bcfca8ab8318e555b00f138a81ec0bed6b7044b28b4f552fc4c112400f01694420603d4032972997c89fcc8edf8bbb3a61dd6a984d55676d8162643a0ccddc035b1935bedc5c776ba5937922f4739264237dfc17f3c9b6cfa3c27a00aa2e0069cf3a87dc94810074cf97ec91fdff59a3ea8c0eda10546b66f1966c5048cf34b8e2dda62cf85bd9384f42c93d384bd6eebfcd90219fdbac5a0725b93299402cb6c7918e3c10569e1e8b5327e52e4a7fd00d8826b81e5196d67eafd483758a1ace83b120e980e9cb393e23a783ed9b2ed7a1df3785d61bc5fa1b73d75fd54e65c3f4b69ef9e5e5c6ccba16195a072555ab90998dbe171dd2c5c0e8162e90e9550cc756f63493045556f987edcfdab3e69d69293b616a33602c1c202f2afc35a93e36a5dcd72fef651a02ef070146e5b99552ab3ae3f3d2aea5862e1c004459a944f931bd67b7b5822d22edecf44de7ad2ae5b8c52bd5b7a5379db61623c1b68ef6d53dbfc70ea9062bac1edffb34ac1342b1f729dd12e084f8949c620b5a6bbf282e4dff0280857866cb9128e9a2ac7d9d68a6ca34271faa61b60697e4cbe136c20c7f0c3df9ec054dfab6ab027f260e20121ec6a4f19424e8d759f5883afe700d7ec5758894d3a1c21f368aa1abe85cce0f03221ca9510b94be666465189a556cde9d1eb2a0bb61ee133c7d33752935bfb0dca9c17a7e965d42d982b81f38cf71daae42076f0ed730bcce56a8a14ead6a39ef7ce9cf41963e7049b3f48f55b63b010a87f9a6647a8560306a085cf56961eafbc3506f91ea659a19a1ff40d0da109c9786fe07676f552f5d336f29613337127095aedd4b7fd7c0544f2f8f2ec15a178e545844cb0d6536b130a80fdd93ea6729f03b1653d8daecce6edf0cade043b2ef476c744c884d88511b4187059620f588d64c67e7f309c92fcb25a77eafc8b69e55a690ae8b5ff53f298c585e555a400886f007a0aba90074c745307f8fcd5aa9fb5b260208e470c3ebe38784a25a998daf95dd003a93688b96c360e0914f9ba5201a6872995ae777a3aca0ef79052a6ebebe9e5d056913cc7f168391effd513f18ca28089d21a06aceb0f28f18dcf9f1565068f5e555e08151cc22bc1d312b6ac8fdc38a8ad46227cda19fae2d580a38806e157c5e960937903f46c2c95e2879f5a946265ea48bb363a924967c7aaa2a459e0bea2d204d358bc4588e6e0a8e18a538a322a2796fae1419e365cc2a8352ffbe9ba4e7298565dc3cddb90bca9043f1202a7b7ddbb9f3cfa5c4c64342fefdc34b3f12f20e6b94516f9b305a9f62a2e09e01ea1515e7a614190d44a995718bba3b5e45e619061b52fb32e7552a97ffcf85991dcc57c7d0700be143c231c484771e3bab0aad80e2df465f46acd0989880201b456706348165397fde8df9f665e9573a12e44f517f5c6f8de7b1858426aca89a93ab002fbedeee3c81b1f21c17d40a5e4ce1747ba5f2f9bf629c87927f89fb340ac8049c6b230da48f8a1c344d77624edf2f394ad68ce63be50b0bf528eb3119875a61c2867b05688c728a3ac24b6027ec73a18e1e6b72e1e4185718fc31b4ace32ad9fe93ee2d02f5e897e9faf2748a496112b323a2a36f9990cd351b5ca613163a4759ff6e2932372af6b653a450b214e107e56be30076aee6efda75ebdaa29e78215baf038ac0de676d1ff851bdd971c1d57a26d59337deaec113d5d40ef66bab2cca46b362c8d6c1bc54983ad5e961e8b91626bf7ca9d19775210be0eb6ab3f882feac24665be577a2597ed4e8180e4f2025ffb71cb81fa744985c1c8a05c562e97e7b0bb4cdd341f18e1b26a459464cab74f6f40f5dcc5f1cac17730a1c6731624867998a8e61bd2615320556fb7eae2090233e93ee45df25b16467efe4e82a16a0ee733dc5a4fa356ab3d7899e1ef06e3e31acfea75889d3b9439c6368c50e240c5cdf5e01fac112587f5c9aaa92490b6b406010e920270402b2e8b60f052dc33a80c532418cf19b05c579721271ac438eea2eb4ec0b954370bc0cea8710b97cbb590517a6f319910a2013f7b4dfceb556d7635c092ee8f575b520f4e08bfb31838e30b8f903f9222413947fb3dd853082a683811bc4a1520045c85551574da2acd5cc7442ed149672e4572ffe5cc25427500bcf96a684da554a0cd6d22d2426d63a08c45151a528c052876acfebee78f4d1764e9c130de9f15da0cfc2259e048be4f2d5531ffe13a11325beb51704b24517ade8d13b3255be9562209c5274d2b2056cae727c4fc58baabba1f2c9278b960d4df115873a8e6c176c721d391f201d0d2fd970695aa5eb9d5deab05a3979da0f468ec09e826381d26a80a57296e5668e5e1490633c6b517a1537952e3e6899c76701275c88e6b3f10682f97ce36eca09ff97416e85c015bc1c24c6fab2478b26cbf70bcf5a228d4bd4b0eadfb9bd5945047651f1c6c2e06839bb4e519eae552631a05299d13e4d70b9a785ee24ef2ff0cfc5b836bb67b5a4a68a6a425f230e9fe6431329ccff0c5ebef9ce667e1df33aeadcae0e0394d2a707e658a4029e4dabdd40930022c90ea4517dd67b08b8bfa8343f156ddf52722c338a31aadeb42b4b61acb6ea852f2f91fe8062adaa035e797df9ce48dd9bc4938d8a2eeb729ac2791214ce19b0e8119824b17765a2a60691c21bc46788b89982cbb5b859e49417111c7d95df85f6cd5ea77a51e1bc81d16399d4f07db497a58729560f43933718a5124c6a6f88fdcfc96a0a1fcf44ef470d053cb62191f39a9b7a94a1e9db11a066f8a6ffdb324f13a22f74e9c52ece946a84cde1ccd1a2a1d9e68f4323db150dc955ed968905d985d92e38b06c14d92f2a68732d4434d6f3b6e2cc192221b3c95eb5bbc14d8a2c13b28f2d9b23cf1a7c13b79d463cbad72f105673c99d2bd4f56696f40b86f37959f3abe86243d5962c8e64d6449c3246ec9314055b6bbb9b5f43294ff3b6cfdf984a7194d17f5d8b99f7cfa489db71080376b1fced3501d1636a491490531322d5d17a6fb7530248d4db3d73767342713a9902f4ad55dea7777ce06e2ed2417a163a428deb566e607909f66f8d93e32709e30d6c8166a401a98f4c7b1022d3733d07a7c5a87426553c755384b8aa3514988b6b5cd3475adafc950e2ab3e0affe0af70d97cdb119f82ed04079004a812dec619cefcf234ef8ddeaf9456c642053850c6a9bf1ea1941935bddf650d2e457439b10b366eed4be90962b9fdfb63ae8c7fa49ec390c90fbbdc8f6072a471d9fe82fe756285d6b5a41480ab35ca06f382303d13143834a751a09ecf8e5d259e3e183beea4a00f23acc5e2ec76015ca7fb7963a99f3804aeb8c2f08e186bf1e75843ec4ebd730a26c2b704ae2ce56ca8d66c27080535b53051c4e36f712a3e7e5d9edb7c313c9e15ff4a21bd083994c41258c16d97fa60e9e4fababf5cc0e24c39649b48438ba0a99bbeab6ad4a12b312b90873700a3b7a027b27891ab3edbe9806ca91d6a12b1ef8ce5e9a11ae798256accd4cd2c285fd516cbea0c2824ca94980d6bcc5f1b25521193b4de64886314e8c83ebeed18ba5206c67bfe9c3110bc5eabe6269ef952121e6a5983865e9c0b420bda53082abce2bbba5c2d1b161b9c584429eebd6142e4162b66fe5e26c96213207a4c12b471c0fb4c615fc803e530112098324652e98583e7ff78371fbabdfcd0fcc6f565eda215524d15c0b94fcce36aa5253bc2534144a41dada3f00eb3238036c601f964b1e7fd31d911f893df9adbd364a1d7f30486ba342427e161d41e975d62a16f9500dee6978607cb5e028d4399162452b316dd178fbafbc9bedcd0e17ee95f3864594917b8f3078cb1ac6996af550a51c1cdd6cc43c196dd7109479712a5929b373f3c40bd21094e0eaccefbfb1ea38a12d64de4d1cdf94c3c6bf73d354981c5012ce3b0f9adb8a3bad4b3199f06d55758d4ebfa8d2c00c969438dd92841aee05ea6d973a3a40e29afe593f8c1a7877dd76bab0b9c086b2616fc4cc81da5cace01c4d11a32f6020638a7292cee763f46a4fe9eaae0b7260b081d81d8c95851e7e702ba41c6648566652ff7aedc3235e2b0d7ab770c4b102368dc4b870869b505d10f1ed305905114ca0c3521f6984bd8ae08c668a967a317ec150fd8efe89cd67f45a52589c3814d80a0ed5a850102b09241c6c1d20e8764735a7bf1ec394e29016cd8cea5a726edb11620bc303b5c695e26114dc5e5d974358719909fb58bbf811292ba3bb5ecd55ccfa7221444e231b136895efec55a9e1321058f6993190373f6d107a42e8edc9875d0938578d5216e9deb8e1bce4ee4d4e5653a519faa8cf88087638c396bdcb3e9af37f7935360cfeb8cc215bd8ba74e1ab267c6edcfe653ee379618c42d36baae09b8947cc1ef20125885f8977f661a217067ebdb8ef999abc519a87ce936c867c867ff6751a3fa056d14c44cc32272a73ad101e55df2c46c9108a527622cc0c1207575c5caf8e9e73a84d263b61b77dd2daf6e084dbd98aa5527c7716a8848fd36a80a363b855b032ca49dc1e23b0b7d70e9207a66ef53a79413d692c8d73056c4211728fba16a4511f67b489834a0d49756833135c01b46244226d6dd6c54d063edf4408d7ec408ccc7df63974eaa7b660484b5b37731901d21e40591b9a0a1649ea68de5cc1a510d60c2a0f84cb868574e7ce4b13a7ab8b4a382235b00913e7c14905cf16b5acf4cca252317dde6fa81c2dd892e8a9f0c2c49e41f0c9a531d15ad866977e2bda0d30864121169a1b2eb3e021642c21c04c35232b13a393bce3a0f6ec033e7ce84a65346a94652795640f0a8ae48b04ad37910b9d276720705a0fb798962355d70782e10114d78280d8a3e1a3f94ccbcbb016c7bd469efc2a00a1b26ad4ff1bb365435dfee7d73a6c9d6ff005c1e22881644f2092328476a022b4d1c555d17c7fe1fa05ee7b631b37cddcd8acd2eccb188181686cd5d6241d6f68deece0ae4c9e1aecdaac9eec98263a852d690170cc3692d568a60b018ee97d5eb06866645b9f751ef306c69"}], 0x1210, 0x800}, 0xd8d}], 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) 22:06:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109716, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1168.609761] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:06:39 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) sysinfo(&(0x7f0000000180)=""/253) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c) fsetxattr$security_smack_transmute(r0, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x3) 22:06:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x97ffffff, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x5000000000000, @loopback}, 0x10) 22:06:40 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x141000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000100)={0xfffffffeffffffff, 0x0, 0x0, 0xffffffffffff0001}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000140)={r1, 0x4}) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x200000c, 0x110, r2, 0x0) 22:06:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10961e, &(0x7f0000000300)) 22:06:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 22:06:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d01a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x1000000, @loopback}, 0x10) [ 1169.906292] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1170.121399] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:06:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x5000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:41 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000000)) 22:06:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xe000000, @loopback}, 0x10) [ 1170.586182] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 22:06:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 22:06:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100017, &(0x7f0000000300)) 22:06:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ce16, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:41 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0xfffffffffffffffd, 0x6]}) 22:06:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x1800, @loopback}, 0x10) [ 1171.411805] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:06:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 1171.658059] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:06:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0xf8f73f00, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100019, &(0x7f0000000300)) [ 1171.989336] kauditd_printk_skb: 154 callbacks suppressed [ 1171.989352] audit: type=1400 audit(1541110002.622:30228): avc: denied { map } for pid=30698 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x2000, @loopback}, 0x10) [ 1172.130344] audit: type=1400 audit(1541110002.632:30229): avc: denied { map } for pid=30696 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f306, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:42 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000000"], &(0x7f0000000000)) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) [ 1172.241437] audit: type=1400 audit(1541110002.632:30230): avc: denied { map } for pid=30696 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.330050] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1172.346751] audit: type=1400 audit(1541110002.652:30231): avc: denied { map } for pid=30696 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.493120] audit: type=1400 audit(1541110002.662:30232): avc: denied { map } for pid=30696 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008e00)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) [ 1172.632754] audit: type=1400 audit(1541110002.702:30233): avc: denied { map } for pid=30698 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.784713] audit: type=1400 audit(1541110002.712:30234): avc: denied { map } for pid=30698 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1172.908504] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1172.909646] audit: type=1400 audit(1541110002.712:30235): avc: denied { map } for pid=30699 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:43 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) r3 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000100)={0x28, 0x0, 0x2711, @reserved}, 0x10, 0x800) r4 = socket$unix(0x1, 0x2, 0x0) kcmp(r1, r2, 0x0, r3, r4) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) [ 1173.080966] audit: type=1400 audit(1541110002.712:30236): avc: denied { map } for pid=30696 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x500, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xfffffffe, @loopback}, 0x10) [ 1173.248359] audit: type=1400 audit(1541110002.722:30237): avc: denied { map } for pid=30699 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10431e, &(0x7f0000000300)) 22:06:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c307, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x200000000000000, 0x0) ioctl$UI_SET_PHYS(r0, 0x4004556a, &(0x7f0000000040)='syz1\x00') 22:06:44 executing program 3: syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYRES32], &(0x7f0000000000)={0xfffffffffffffffe, 0x0, [0x2, 0xf29]}) 22:06:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xffffff91, @loopback}, 0x10) [ 1174.309686] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:06:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10601e, &(0x7f0000000300)) 22:06:45 executing program 2: epoll_create1(0x80000) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x1a7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000340)) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140)={0x1f, 0x7ff, {0x7, 0x1, 0x0, 0xef, 0x7, 0x80000001}, 0x0, 0x4}, 0xe) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x20000000000000, 0x141400) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x78) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="00fbd201d5e16d92af4fb7823bb45e15e0ee55dc3707a07e7aac7065c0d62e2351ffb1d021cdd00fb8699c5c97337fe6966f790975c9106c34093e38841d9911a5254333bfa52f3c55a4d45a70a5ce32ad6d095a35c61e159d9880d6a77903a19bd1c43f332a340380f38cc17d89462547a76f0a48756b47d8058e0747827ff78828d422a03493ef643c46378f185bc4c7f4619a1715689f22f19b95081da9dc25c133e9cf4f1e22e5ebb26737038a3f09bc68ed0b6f3eb139994db99f5774db94973ec0e1700c17657628eadd87ba"], 0x1, 0x2) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) 22:06:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0xa, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:45 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f00000000c0)) 22:06:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109319, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xa00000000000000, @loopback}, 0x10) [ 1175.385359] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1175.547895] xprt_adjust_timeout: rq_timeout = 0! 22:06:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0xfffffff5, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x5000000, @loopback}, 0x10) 22:06:46 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="0c00000080f0ffffff0000000000000091c2621f94cf4c83ac81b18791cfec8c0c17cb56c19fc8ef8c51a445484747a89e8fd4cce484ad0b7dec2c2b07fc5a33df39b810ef5df9911db86f50ea54f49f19a1bed72afb82896933428c2a0a95c350c7ae3eb0cbfb54734b95f33072c83436b633035c32cd50614d6ebf269649fc7341e3eebfc9b6581a5aeec6a353834aa2cf48de63505b2e9f29493dd9191bf5e7eea8b57663c9b2484b0a72dc671c195f6d1e0f6865e5116da61b9a8c5c00"], &(0x7f0000000000)) 22:06:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b217, &(0x7f0000000300)) [ 1176.158876] xprt_adjust_timeout: rq_timeout = 0! 22:06:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000100)) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 22:06:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a80e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:47 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000280)=ANY=[], &(0x7f00000000c0)={0xffffffffffffffff, 0x0, [0x835, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x5]}) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xd0, r1, 0x1ab21f318a264d75, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x14857157507e60a0}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffffd}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5bf0}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x804c35f31da3cddf}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xf94}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xbe47}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1f}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x70a}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6138}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xc1}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40040}, 0x4000080) 22:06:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x4603, @loopback}, 0x10) 22:06:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108316, &(0x7f0000000300)) 22:06:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x20000) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, 0xa, 0xbce8d7c5ed87c03e, 0x700, 0x70bd2a, 0x25dfdbfd, {0xc, 0x0, 0x4}, [@typed={0xc, 0x4e, @u64=0x8}, @typed={0xc, 0x1c, @u64=0x800}, @nested={0xc, 0x63, [@typed={0x8, 0x13, @u32=0x3}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4004041}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x4000)=nil, 0x4000, 0x1, 0x2000000000000032, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) fstatfs(r3, &(0x7f0000000240)=""/108) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @rand_addr}, 0xc) getsockopt$inet_mtu(r4, 0x0, 0x29, &(0x7f0000000040), &(0x7f0000000000)=0x4) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891b, &(0x7f0000000080)={'veth0_to_bridge\x00', {0x2, 0x0, @broadcast}}) close(r4) dup3(r2, r3, 0x0) [ 1177.116962] kauditd_printk_skb: 153 callbacks suppressed [ 1177.116978] audit: type=1400 audit(1541110007.752:30391): avc: denied { map } for pid=30816 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1177.238202] audit: type=1400 audit(1541110007.822:30392): avc: denied { map } for pid=30816 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x97ffffff00000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1177.354275] audit: type=1400 audit(1541110007.822:30393): avc: denied { map } for pid=30816 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:48 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00008000000100000000d9fa0000008fd037228fbadc7ce32de52aa5390187d0190180cb65adfe"], &(0x7f0000000000)) 22:06:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x240, @loopback}, 0x10) [ 1177.468205] audit: type=1400 audit(1541110007.822:30394): avc: denied { map } for pid=30816 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1177.550592] audit: type=1400 audit(1541110007.832:30395): avc: denied { create } for pid=30815 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1177.682335] audit: type=1400 audit(1541110007.862:30396): avc: denied { write } for pid=30815 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:06:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106813, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1177.879703] audit: type=1400 audit(1541110007.872:30397): avc: denied { map } for pid=30816 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysfs$3(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000006000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x11, 0x5, &(0x7f0000006000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1}]}, &(0x7f0000000080)="73797a6b6a700183f4f69a28b4a9135eec9746a7656c6c657200", 0x4, 0x1000, &(0x7f0000008000)=""/4096}, 0x48) [ 1178.003154] audit: type=1400 audit(1541110007.892:30398): avc: denied { read } for pid=30815 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1178.129324] audit: type=1400 audit(1541110007.922:30399): avc: denied { map } for pid=30820 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1178.249570] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1178.280684] audit: type=1400 audit(1541110007.922:30400): avc: denied { map } for pid=30820 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bd06, &(0x7f0000000300)) 22:06:49 executing program 3: syz_emit_ethernet(0x1296, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @local, [{[{0x9100, 0x3ff, 0x80000000, 0x1}], {0x8100, 0xffffffff, 0xc923, 0x2}}], {@ipv6={0x86dd, {0xfd93, 0x6, "b0e3d9", 0x1258, 0x7f, 0x0, @ipv4={[], [], @loopback}, @mcast1, {[@fragment={0xff, 0x0, 0x3, 0x6, 0x0, 0x3ef5b3b, 0x64}, @srh={0x84, 0x10, 0x4, 0x8, 0x6, 0x8, 0x0, [@local, @loopback, @ipv4={[], [], @multicast1}, @local, @dev={0xfe, 0x80, [], 0x1d}, @loopback, @local, @mcast2]}, @dstopts={0x3b, 0x208, [], [@calipso={0x7, 0x10, {0x2, 0x2, 0x5ad8, 0x800, [0x7ff]}}, @generic={0x7f, 0x1000, "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"}, @pad1, @enc_lim={0x4, 0x1, 0x400}, @calipso={0x7, 0x10, {0x4, 0x2, 0x1f, 0x7ff, [0xffffffffffff339e]}}, @generic={0x8, 0xe, "e413c92281a1227e09b5de9d7928"}, @jumbo={0xc2, 0x4, 0x6}]}, @srh={0x29, 0x2, 0x4, 0x1, 0xaf3, 0x10, 0x10000, [@loopback]}], @gre={{0x0, 0x0, 0x1, 0x100, 0x0, 0x4, 0x0, 0x1, 0x880b, 0x80, 0x2, [0xc787], "c08ff04ad645c11ad3ef7ac11713430b9a0247cc6ca9b78a733d8c1dd0817f0759f14121ce1d9aacbd54893f5a8fe5b8f06bd9eb55392835935dde011978b740d79517d12dd792e7cf3a14911a9611a633b7c0e7c271b40d856f6229c4b2c81c400e0806e03cdd6794b58d850062fc8d21fde9ea270d7193b8c2795604a0eff0"}, {0x3ff, 0x0, 0x5, 0x1, 0x0, 0x0, 0x800, [0x1], "e26c4df3f2dadac551148a40d844a3f63110f09d110bfe33bb64eea05acb9ad66470f838eedf247563cc8e17d5b6bdfb4b82afa178ec6cfe290623cf757e83b240eaf0444d4554f43ac96e228125e4e834a049d59171befd69d23d8b2a6d492906beee30a75ce91b999021"}, {0x3, 0x0, 0x9, 0x6, 0x0, 0x0, 0x86dd, [0xc7c6, 0x6, 0x4], "12"}, {0x8, 0x88be, 0x3, {{0x8, 0x1, 0xffffffffffffffff, 0xbc67, 0x0, 0x401, 0x4, 0x3}, 0x1, 0x8001}}, {0x8, 0x22eb, 0x1, {{0x100000000, 0x2, 0xffff, 0x9, 0xdb90, 0x26b, 0x5, 0x7}, 0x2, 0x2, 0x100000001, 0x9, 0x9, 0x7, 0x7, 0x1f, 0x7fffffff, 0x7f}}, {0x8, 0x6558, 0x1, "9dbec37a9a383455d919f5fb57e40168e603ef5d0e4ce7b283e1b40ea91474920502d86e35c8"}}}}}}}, &(0x7f0000000040)={0x1, 0x3, [0x74, 0x558, 0x342, 0x69e]}) syz_emit_ethernet(0x2, &(0x7f0000001400)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000000)={0x0, 0x400, [0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff]}) 22:06:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x4603000000000000, @loopback}, 0x10) 22:06:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102000, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:49 executing program 2: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r1, 0x43cf6202) sendfile(r1, r2, &(0x7f0000000040), 0x2008000fffffffe) 22:06:49 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="0c004138a2d0f76e0000000001000000000000040000402aba358bca36b3fe626f3214ccb700e8736223763471d759a81fb4a8d254fad93f7b81c9c8f50421b97269b86f72040ac6ef1a"], &(0x7f0000000000)) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x80, 0x3, 0x9, 0x9, 0x136606f5, 0x400, 0xe0a, {0x0, @in={{0x2, 0x4e24, @rand_addr=0x3}}, 0x1, 0x5, 0x80000001, 0x0, 0xe665}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000240)={r1, 0xc2}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r1, 0xee}, 0x8) 22:06:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x3f00000000000000, @loopback}, 0x10) 22:06:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101706, &(0x7f0000000300)) [ 1179.561338] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:06:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0xab0d, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:50 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)={0x0, 0x4, [0x950, 0x0, 0x0, 0x8ac]}) r0 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000000c0)) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000080)=0x10) 22:06:50 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8001) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100000001}) fallocate(r0, 0x20, 0x0, 0x100000000) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0xb) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000040)={0x5, 0x3, 0x1}) 22:06:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x91ffffff00000000, @loopback}, 0x10) 22:06:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10fe08, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108007, &(0x7f0000000300)) [ 1180.826229] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:06:51 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) getrusage(0x0, &(0x7f00000003c0)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x30000000, 0x7, 0xfffffffffffffffd, 0x8b, 0x8, 0x100, 0x2, 0x7f34, 0x7d, 0x1dcd, 0x35, 0x7fffffff, 0x9e, 0xffffffff, 0x7, 0x7ff}}) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f00000000c0)={{0x3, @name="afc66fa0d713750aa9b866548ac00bccad58297724025a55b6f5b8670b054ab0"}, 0x8, 0x4804, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r1, 0x9d, "9bbef4", "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"}}, 0x110) [ 1181.002863] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:06:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x300, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x700, @loopback}, 0x10) 22:06:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02402b6285717070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000100), 0x800) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r2, &(0x7f0000000200)="e5", 0x1, 0x8800, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000240)="3ce7ef6a182f3fa81236c0c2556811b26914ab15017d61706759035f0574871e81264d9cb599e7a084a6fab3200c56a4906cf4bdeb6bc1b286ae24c81f7aaedadfcce2a167f4d0602b2d55f69e6ba404a6e8ba1270c834fd9e4bb9a16773ac3e3477524a4276a4d4000000000000a6f91b9d9b1a5fd984af034a6ca117e4dbb53e4da08ea04eb595afa593fc8717d615383b847c120c93272182d2b55888bfe32caa754b8aab12e52d47d9e354e864bc87f8009db70d0fa7339e8953e217ef40b407bfc0ad9e4bc4843db80dee690f392af61738a4c977a7", 0x0, 0x0, 0x0, 0xfffffffffffffc78) 22:06:52 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x182) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f00000000c0)={0x1, 0x2af7, 0x103, 0x3, {0x2, 0x8000000000, 0x5, 0x5}}) 22:06:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108e0c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b917, &(0x7f0000000300)) 22:06:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x600, @loopback}, 0x10) [ 1182.140095] kauditd_printk_skb: 169 callbacks suppressed [ 1182.140123] audit: type=1400 audit(1541110012.782:30570): avc: denied { map } for pid=30933 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:53 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000180)=""/137) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000fb000000380000000000000000000000000020003801"], 0x2e) ioctl$KVM_NMI(r0, 0xae9a) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000240), 0x1000) syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0xc0, 0x40000) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000040)="cf48c20ea57a5b9af853a7d8a28138be4a9ba478723d6f8f3371990e09d11cb87fb403120393843ba01e4f183dfa1153f12a7c9348d78ff22eb96bfa9b258f20a8933e4b04bcfd6ed55e93ae855aff83279f6cafff524b7f89f5414e53175bd6f190045603cc5475624a2cf358c62952e3") [ 1182.310103] audit: type=1400 audit(1541110012.782:30571): avc: denied { map } for pid=30933 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1182.336385] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1182.475625] audit: type=1400 audit(1541110012.782:30572): avc: denied { map } for pid=30933 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1182.605153] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1182.640094] audit: type=1400 audit(1541110012.852:30573): avc: denied { map } for pid=30933 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0xf5ffffff, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1182.759713] audit: type=1400 audit(1541110012.882:30574): avc: denied { map } for pid=30933 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:53 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x100, 0x10100) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000000c0)='veth0_to_team\x00') getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={0x0, 0xc0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0x3f, 0x3, [0x401, 0x0, 0x0]}, 0xe) [ 1182.878546] audit: type=1400 audit(1541110012.912:30575): avc: denied { map } for pid=30933 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x7, @loopback}, 0x10) [ 1183.013051] audit: type=1400 audit(1541110012.922:30576): avc: denied { map } for pid=30933 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1183.160012] audit: type=1400 audit(1541110013.122:30577): avc: denied { map } for pid=30941 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102707, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104001, &(0x7f0000000300)) [ 1183.288303] audit: type=1400 audit(1541110013.122:30578): avc: denied { map } for pid=30941 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1183.437937] audit: type=1400 audit(1541110013.122:30579): avc: denied { map } for pid=30941 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:54 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000fe3)="441f48e30700000000000000fe36cef3e26def23000200000011000013", 0x1d) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000000c0)=[0xee01, 0xee01, 0xee00, 0xee00, 0x0, 0x0, 0xffffffffffffffff]) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) r6 = getgid() getgroups(0x1, &(0x7f00000002c0)=[0x0]) getgroups(0x7, &(0x7f0000000300)=[r1, r2, r3, r4, r5, r6, r7]) 22:06:54 executing program 3: r0 = syz_open_dev$adsp(&(0x7f00000033c0)='/dev/adsp#\x00', 0x1f, 0x200000) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000003400)) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c00000000000100020000ecb8cf51ef"], &(0x7f0000000000)) r1 = gettid() r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003380)='/selinux/mls\x00', 0x0, 0x0) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x3) process_vm_writev(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/166, 0xa6}, {&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000240)=""/4096, 0x1000}], 0x3, &(0x7f0000003340)=[{&(0x7f0000001240)=""/1, 0x1}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000002280)=""/136, 0x88}, {&(0x7f0000002340)=""/4096, 0x1000}], 0x4, 0x0) 22:06:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x1f4, @loopback}, 0x10) [ 1183.963294] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1184.180049] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:06:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x600, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10621c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103010, &(0x7f0000000300)) 22:06:55 executing program 2: socket$inet6(0xa, 0x1000000000006, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x100) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), r0, &(0x7f0000000dc0), 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x7, 0x7, 0x401, 0x0, '\x00', 0x2}, 0x0, 0x3, 0x3f, r2, 0x2, 0x8, 'syz1\x00', &(0x7f0000000140)=['overlay\x00', "766d6e6574315e276367726f757025706f7369785f61636c5f6163636573735c7b8400"], 0x2b, [], [0x0, 0x0, 0xffffffffffff7fff, 0x1]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9097e116bcf3181884a7e723a37fec3bbd3d48d38a6e5f725074b96"]) chdir(&(0x7f0000000280)='./file0\x00') mkdir(&(0x7f0000000080)='./file1/file0\x00', 0x140) mount$overlay(0x0, &(0x7f0000000100)='./file1/file0\x00', &(0x7f00000001c0)='overlay\x00', 0x2000000, &(0x7f0000000740)={[{@workdir={'workdir', 0x3d, './file2'}}, {@workdir={'workdir', 0x3d, './file2'}}, {@xino_on='xino=on'}, {@xino_on='xino=on'}, {@redirect_dir={'redirect_dir', 0x3d, './file1/file0'}}], [{@audit='audit'}, {@uid_eq={'uid', 0x3d, r3}}, {@hash='hash'}, {@euid_gt={'euid>', r3}}, {@euid_gt={'euid>', r3}}, {@smackfshat={'smackfshat'}}, {@smackfsdef={'smackfsdef', 0x3d, '\'selinux:eth0'}}, {@obj_type={'obj_type', 0x3d, '-trusted\avboxnet0&cpusetproc\tmime_type'}}, {@euid_eq={'euid', 0x3d, r3}}]}) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5, 0x81}) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000380)=0x4a, 0x4) mount$overlay(0x0, &(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='overlay\x00', 0x240080, &(0x7f0000000600)={[{@lowerdir={'lowerdir', 0x3d, './file1'}}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000240), &(0x7f00000002c0)) fallocate(r4, 0x40, 0x44, 0x81000f3) 22:06:55 executing program 3: syz_emit_ethernet(0x2, &(0x7f0000000080)=ANY=[@ANYPTR, @ANYBLOB="c64e8ffc8f167c107c2fab560f60d89a164477c2885719cc291f030002226adf42ba"], &(0x7f0000000000)={0x0, 0x0, [0x0, 0x94a]}) getrlimit(0xf, &(0x7f0000000040)) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x1) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000180)={@mcast2, r1}, 0x14) 22:06:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x1800000000000000, @loopback}, 0x10) [ 1185.365056] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:06:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10001e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:56 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fchdir(r0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f00000000c0)) 22:06:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10321b, &(0x7f0000000300)) 22:06:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xffffffff00000000, @loopback}, 0x10) 22:06:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/72, 0x48) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) [ 1186.827379] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:06:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xfeffffff00000000, @loopback}, 0x10) 22:06:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a919, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:57 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000080)=""/234, 0xea}, {&(0x7f0000000180)=""/75, 0x4b}, {&(0x7f0000000200)=""/215, 0xd7}, {&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000380)=""/118, 0x76}, {&(0x7f0000000400)=""/105, 0x69}, {&(0x7f0000000480)=""/178, 0xb2}, {&(0x7f0000000540)=""/199, 0xc7}], 0x8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x8, 0x1000400000000004, 0x1, 0x0, 0xffffffffffffffff, 0x80000000000000}, 0x2c) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f00000006c0)={0x3, 0x7ff}) 22:06:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104803, &(0x7f0000000300)) [ 1187.158499] kauditd_printk_skb: 145 callbacks suppressed [ 1187.158515] audit: type=1400 audit(1541110017.792:30725): avc: denied { map } for pid=31043 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1187.303672] audit: type=1400 audit(1541110017.842:30726): avc: denied { map } for pid=31043 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:58 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0xeab]}) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x1) write$P9_RMKDIR(r0, &(0x7f0000000280)={0x14, 0x49, 0x1, {0x50, 0x2, 0x4}}, 0x14) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/status\x00', 0x0, 0x0) write$nbd(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="67446698010000000300000004000000300879062a69a1ae7d3f6622929ad308884ed3bebd43838e5be204388c075b6f0387bdc03095b6cb375a4909f1b4314fbb4f3929345682d943a6b1a9ba6809386762596d22297cc242edfd5806d410e1ef4317959cecab570e37b359a3ac9926698f055edffced282a366d26ca6013531c721e5563c9"], 0x86) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f00000001c0)=""/185, &(0x7f0000000140)=0xb9) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000180)={'dummy0\x00', 0x7}) [ 1187.456883] audit: type=1400 audit(1541110017.842:30727): avc: denied { map } for pid=31043 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1187.639670] audit: type=1400 audit(1541110017.852:30728): avc: denied { map } for pid=31044 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x18020000, @loopback}, 0x10) [ 1187.789718] audit: type=1400 audit(1541110017.852:30729): avc: denied { map } for pid=31044 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1187.949718] audit: type=1400 audit(1541110017.852:30730): avc: denied { map } for pid=31044 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.075271] audit: type=1400 audit(1541110017.902:30731): avc: denied { map } for pid=31044 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1188.252627] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1188.257604] audit: type=1400 audit(1541110017.912:30732): avc: denied { map } for pid=31043 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108413, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1188.440142] audit: type=1400 audit(1541110017.912:30733): avc: denied { map } for pid=31043 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:06:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10290b, &(0x7f0000000300)) [ 1188.599934] audit: type=1400 audit(1541110017.972:30734): avc: denied { map } for pid=31044 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:06:59 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x7f, @loopback, 0x4e22, 0x4, 'lblcr\x00', 0x38, 0x7, 0x70}, 0x2c) syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)) write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000000c0)={0xa, 0x8, 0xfffffffffffffffe, 0x8}, 0xa) 22:06:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xe00000000000000, @loopback}, 0x10) 22:06:59 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000680)=0xfff, 0x1) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x509200, 0x0) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f00000003c0)=0x80, 0x4) 22:07:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10411c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:00 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0xfffffffffffffffd]}) 22:07:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x46030000, @loopback}, 0x10) 22:07:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e00e, &(0x7f0000000300)) [ 1189.642046] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1189.869744] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0xfcfdffff00000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:00 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x240, 0x0) write$tun(r0, &(0x7f00000000c0)={@val={0x0, 0x9000}, @void, @ipx={0xffff, 0x9a, 0x3ff, 0x4, {@broadcast, @random="3d29cfe297eb", 0x8092}, {@broadcast, @random="46a864abe62a", 0x100000001}, "fbd5311067ccc1aebf4ddb8ac66239f65f92156328059fd166f2cf4e92baf25cec5b45c47d6b955af2e46ba89b56bb5728e26b81d9673ecaa24b745691029ad4219ccaf5bd0416e1509b529869bf894673f39ca058b6beaddd4258adaddefa461db27d97d85d9c48bd351cbd5310d4f60832be1a772f8a59b7898f0c"}}, 0x9e) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c854c000001f5ff00000000000000"], &(0x7f0000000000)) 22:07:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x3f000000, @loopback}, 0x10) 22:07:01 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x2) write$apparmor_exec(r0, &(0x7f00000002c0)=ANY=[@ANYPTR64, @ANYRES32=0x0, @ANYPTR64, @ANYRES64, @ANYRES16=0x0], 0x5) write$P9_RWSTAT(r0, &(0x7f0000000080)={0x7}, 0x7) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) 22:07:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107e15, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ed0e, &(0x7f0000000300)) 22:07:01 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x800, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="c27ec83b8a89fe7a0bd3a801f9cc676eb137d16aff5aa07c0c924d77365c05d5387946b1211da2370282e8eecd8a3895af2c05df5102312419e67dc42dabb6dcba962d2a0bb514f4bd166b610b01962a152bd90b06a6781e4f062edf74d6c226b99f212d9650670ec1", &(0x7f0000000140)=""/114}, 0x18) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000200)=0x6) 22:07:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x4703, @loopback}, 0x10) [ 1191.309736] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-aesni-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000a80)={&(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/92, 0x200002dc}], 0x1, &(0x7f0000000a00)=""/111, 0x6f}, 0x0) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000000)=0x81, 0x4) [ 1191.503192] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x1000000000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:02 executing program 3: syz_emit_ethernet(0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0x8000000000000000]}) 22:07:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10cb0b, &(0x7f0000000300)) [ 1192.169413] kauditd_printk_skb: 144 callbacks suppressed [ 1192.169429] audit: type=1400 audit(1541110022.802:30879): avc: denied { map } for pid=31147 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x346, @loopback}, 0x10) [ 1192.339654] audit: type=1400 audit(1541110022.862:30880): avc: denied { map } for pid=31147 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b818, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1192.485512] audit: type=1400 audit(1541110022.882:30881): avc: denied { map } for pid=31147 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1192.623744] audit: type=1400 audit(1541110022.932:30882): avc: denied { map } for pid=31153 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:03 executing program 3: timerfd_create(0x6, 0x400080800) [ 1192.789503] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1192.805043] audit: type=1400 audit(1541110022.932:30883): avc: denied { map } for pid=31153 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1192.939658] audit: type=1400 audit(1541110022.932:30884): avc: denied { map } for pid=31153 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x5, @loopback}, 0x10) 22:07:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x3b000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1193.102809] audit: type=1400 audit(1541110022.942:30885): avc: denied { map } for pid=31147 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = creat(&(0x7f0000000000)='./file0\x00', 0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x10000000}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast2, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xfffffffffffffffe, 0x0, 0x2000000000}, 0x2c) [ 1193.212991] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1193.218837] audit: audit_lost=17 audit_rate_limit=0 audit_backlog_limit=64 [ 1193.236738] audit: audit_backlog=65 > audit_backlog_limit=64 22:07:04 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x2000, 0x0) connect(r0, &(0x7f0000000100)=@in6={0xa, 0x4e24, 0x0, @local, 0xfffffffffffffffc}, 0x80) syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], &(0x7f00000001c0)={0xfffffffffffffffc, 0x0, [0x0, 0xc]}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x8000, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000080)) socket$can_bcm(0x1d, 0x2, 0x2) 22:07:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107e13, &(0x7f0000000300)) [ 1193.951359] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b25/0x1d70 22:07:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x4703000000000000, @loopback}, 0x10) 22:07:04 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc038563c, &(0x7f0000000300)={0x0, 0x8b5}) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x901) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000003c0)) sendto$inet(r1, &(0x7f0000000080)="5d1185fd0301fb8f83010cb4f325edc7cfabe08a9703", 0x16, 0x4, &(0x7f00000000c0)={0x2, 0x4e24, @rand_addr=0x1}, 0x10) 22:07:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108813, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1194.399571] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:05 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c006952000001000000000000000000"], &(0x7f0000000000)) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000040)) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f00000000c0)={0x7fff, [0xbf, 0x6, 0x8, 0x7, 0x8, 0x5, 0x4, 0x10001, 0x0, 0xfffffffffffffff9, 0x8001, 0xb848, 0x2, 0x8, 0x1, 0x4, 0x100000001, 0xe8, 0x2, 0xfc4, 0x0, 0x0, 0x100000001, 0x5, 0x100, 0x5fd269ac, 0xffffffff, 0x5, 0x3f, 0x1, 0x7, 0x3, 0x8000, 0x83, 0x7, 0x4, 0xfffffffffffffffe, 0x9, 0x7, 0x1, 0x3, 0xfffffffffffffffa, 0x9, 0x1a, 0x7, 0x2, 0x200, 0x40]}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) [ 1194.580085] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x7a00, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x100000000000000, @loopback}, 0x10) 22:07:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10801a, &(0x7f0000000300)) 22:07:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./control\x00', 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x9c32f69e6caa24eb) lstat(&(0x7f0000000240)='./control\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)={0x1, 0x89f}) chown(&(0x7f0000000080)='./control\x00', 0x0, r1) r2 = open(&(0x7f0000000000)='./control\x00', 0xc40beb2474dfd22a, 0x0) fchmod(r2, 0x0) mkdir(&(0x7f0000000100)='./control\x00', 0xa8) 22:07:06 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) 22:07:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a819, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xe8030000, @loopback}, 0x10) [ 1195.929706] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./control\x00', 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x9c32f69e6caa24eb) lstat(&(0x7f0000000240)='./control\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)={0x1, 0x89f}) chown(&(0x7f0000000080)='./control\x00', 0x0, r1) r2 = open(&(0x7f0000000000)='./control\x00', 0xc40beb2474dfd22a, 0x0) fchmod(r2, 0x0) mkdir(&(0x7f0000000100)='./control\x00', 0xa8) [ 1196.096049] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0xf8f73f0000000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b80d, &(0x7f0000000300)) 22:07:07 executing program 3: r0 = socket$pptp(0x18, 0x1, 0x2) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYPTR64], &(0x7f0000000000)={0x1, 0x0, [0x0, 0x8000]}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000001c0)={r0}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x5) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x20400, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000012c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000013c0)=0xe8) bind$bt_hci(r2, &(0x7f0000001400)={0x1f, r3, 0x3}, 0xc) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f00000000c0)={0x3b}) 22:07:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x47030000, @loopback}, 0x10) 22:07:07 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000040)) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000080)) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@loopback, @mcast1, @local, 0x7, 0x400, 0xfffffffffffffffb, 0x500, 0x9, 0x2000000, r1}) getpeername$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00', r2}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x3, &(0x7f0000000240)=[{0x7, 0x80000000, 0x8, 0x8001}, {0x8001, 0x9, 0xe04e, 0x6}, {0x1, 0x7, 0x8, 0x5}]}, 0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x160, 0x6, [0x401, 0x8, 0x6, 0x8, 0x2, 0x7fff]}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000340)={r3, 0x7fff}, &(0x7f0000000380)=0x8) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x8b, 0x1, 0x8, "dfbd8fedf36fb2fea92c35da0b3abf5b", "1a5133688e16af3bd48c9691b873afe77a71549b6ae31fe173e49fe5839dea5ba8c370f59e8f43b0a7e3fcf2ef2e2a261b0d53419b046a08a7e17426f709a58f8c3132d24491dfb659e28fbc97abd0b18c3da9277f84abd0305e97e879360dd9fbe100003c342e212be7aa66edb4a4959075ffaa79cc"}, 0x8b, 0x2) symlinkat(&(0x7f0000000500)='./file0\x00', r0, &(0x7f0000000540)='./file0\x00') setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) r5 = open(&(0x7f0000000580)='./file0\x00', 0x22000, 0x0) write$P9_RREAD(r5, &(0x7f00000005c0)={0xf2, 0x75, 0x1, {0xe7, "28aa75716b28fee2d4a4421b746de1e5ffc628e558cc70f69be91222f2f4042cff9efb808946a72d9b2aae4641f10d51b104e0abb66d84e8f6fb0a9dc88a96cf9be4b33936d2e27cb4c21b9388412fb00a39ab81e87a64a4db5a3e07df6fd648a1292ae33999aa45f1894669c55a22cb8b5ace46880f7181e642d036331402bc4ff5d1df977a9cc3b55a1b64e09916450798774ba17b90a8dda50cb72df148ccc55b9f1bc70c6c4b926de72038fd6689a34514fae42cba9948a4416591d1054798f842ff8e3a5517a637a5ce6ab50b995d0d013c98f4db4125806c7405188e0384a906ed8b2c22"}}, 0xf2) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000006c0)=""/119) recvmmsg(r5, &(0x7f0000002200)=[{{&(0x7f0000000740)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f00000007c0)=""/33, 0x21}, {&(0x7f0000000800)=""/235, 0xeb}, {&(0x7f0000000900)=""/95, 0x5f}, {&(0x7f0000000980)=""/131, 0x83}, {&(0x7f0000000a40)=""/109, 0x6d}, {&(0x7f0000000ac0)=""/187, 0xbb}, {&(0x7f0000000b80)=""/80, 0x50}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/61, 0x3d}], 0x9, 0x0, 0x0, 0xfb}, 0x100}, {{&(0x7f0000000d80)=@ipx, 0x80, &(0x7f00000020c0)=[{&(0x7f0000000e00)=""/131, 0x83}, {&(0x7f0000000ec0)=""/229, 0xe5}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000001fc0)}, {&(0x7f0000002000)=""/176, 0xb0}], 0x5, &(0x7f0000002140)=""/159, 0x9f, 0xc00000000}, 0x1}], 0x2, 0x20, &(0x7f0000002280)) r6 = semget$private(0x0, 0x0, 0x100) semctl$IPC_STAT(r6, 0x0, 0x2, &(0x7f00000022c0)=""/158) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000002380)={r4, @in={{0x2, 0x4e20, @remote}}, 0x3, 0x1}, 0x90) r7 = mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x10, r5, 0x12) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000002540)={0x44, 0x0, &(0x7f0000002440)=[@acquire={0x40046305, 0x2}, @acquire_done={0x40106309, r7, 0x2}, @request_death={0x400c630e, 0x2, 0x3}, @request_death={0x400c630e, 0x4, 0x3}, @acquire={0x40046305, 0x4}], 0x6a, 0x0, &(0x7f00000024c0)="cbefd60753af35d875bb2cae6476e8d6c72068fad974b7bf200a0df466f1b1d229965ca2a5254d59e0707a649cea38b4471d4b0a0889b0b4946cfc4d7f1676c6a760ab664ac1f6cb4ef148c74d41c748209d8c2e44e43254a2e64108651514fe3221e4b5f4f7e95806f8"}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r5, 0x111, 0x5, 0x91, 0x4) semtimedop(r6, &(0x7f0000002580)=[{0x0, 0x42, 0x1800}, {0x0, 0xf4, 0x1000}, {0x0, 0x1a, 0x1800}, {0x0, 0x549, 0x1800}, {0x3, 0x80000001, 0x1000}, {0x5, 0x100000000, 0x800}, {0x3, 0xa000000, 0x1000}], 0x7, &(0x7f00000025c0)={0x0, 0x989680}) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000002600)=0x1) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000002640)={0x2, 0x1, 0x94, 0x5}, 0xc) mq_timedreceive(r0, &(0x7f0000002680)=""/182, 0xb6, 0x1ff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000002740)=""/61) ioctl$LOOP_CLR_FD(r0, 0x4c01) 22:07:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102e19, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1197.218196] kauditd_printk_skb: 193 callbacks suppressed [ 1197.218211] audit: type=1400 audit(1541110027.852:31064): avc: denied { map } for pid=31255 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:07 executing program 3: prctl$setname(0xf, &(0x7f0000000040)='\\$\x00') r0 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x433, 0x18002) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000000c0)=0x8000) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000001c06"], &(0x7f0000000000)) signalfd4(r0, &(0x7f0000000100)={0x3}, 0x8, 0x800) [ 1197.273709] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1197.335797] audit: type=1400 audit(1541110027.862:31065): avc: denied { map } for pid=31255 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1197.485760] audit: type=1400 audit(1541110027.922:31066): avc: denied { map } for pid=31255 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1197.512536] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x4000, @loopback}, 0x10) [ 1197.611940] audit: type=1400 audit(1541110027.942:31067): avc: denied { map } for pid=31255 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10350f, &(0x7f0000000300)) 22:07:08 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000040)=""/83, &(0x7f0000000380)=""/181, &(0x7f0000000440)=""/141}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=""/236, &(0x7f0000000900)=""/57, &(0x7f0000000800)=""/70}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000001c0)=0x1) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000180)={r0, 0x0, 0x6, 0x5, 0x4}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4008af04, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000a00)=""/99, &(0x7f0000000a80)=""/123, &(0x7f0000000b00)=""/98}) 22:07:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1197.750566] audit: type=1400 audit(1541110028.032:31068): avc: denied { map } for pid=31255 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1197.856913] audit: type=1400 audit(1541110028.032:31069): avc: denied { map } for pid=31255 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.124415] audit: type=1400 audit(1541110028.112:31070): avc: denied { map } for pid=31266 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.181093] audit: type=1400 audit(1541110028.112:31071): avc: denied { map } for pid=31266 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.206928] audit: type=1400 audit(1541110028.162:31072): avc: denied { map } for pid=31266 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1198.234534] audit: type=1400 audit(1541110028.162:31073): avc: denied { map } for pid=31266 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a014, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:09 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)={0x1, 0x0, [0x546, 0x0, 0x7e5]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f00000000c0)={0x0, @src_change}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000180)) 22:07:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x3f663a73, @loopback}, 0x10) 22:07:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000065ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0022f8ff020000000000000000000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000140)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000440)="0e", 0x1}], 0x1}, 0x20008044) sendmmsg(r1, &(0x7f0000000ec0)=[{{&(0x7f0000000040)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)='E', 0x1}], 0x1, &(0x7f0000001780)}}], 0x1, 0x0) 22:07:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109f1b, &(0x7f0000000300)) 22:07:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x7a000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:10 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x100) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000001c0)={0x2, 0xd6, &(0x7f00000000c0)="e131a960ee60e0ddcdd779b722d54ed70d40ab2a104302b2109f6cc030f4386b5823d9e6133712e3add2f74013f5dc6a46eb3a02a90645bd5f26b0d10fdab5af6b023a8c67343fd78fe6e56b2514eb1a2fa7577b5f0d47de998f5e9dd16a24b3c2e78d39d251d517b7b393cd4e40e38392364bd625186a88c6e0583ddaf12abd4999d1de39925b3ffab50fec658b1b367c5cc57e37b51440bc11b6ca34fe065d9dce50af8764cfbcf3bf58ca913ca83a372eaf33517a6d6c90e1fe5f9dae656d4175f45a7a2a2f659e5aa5c22b15e34dfefef4992685"}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000200)) 22:07:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x3e8, @loopback}, 0x10) 22:07:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104c0b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000240)=r1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x4, 0x4000) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000200)=0x7ff) write$P9_RCREATE(r2, &(0x7f00000001c0)={0x18, 0x73, 0x2, {{0x41, 0x2, 0x5}, 0x855}}, 0x18) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) poll(&(0x7f0000000080)=[{r3}, {r0, 0x8}], 0x2, 0x3) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) accept4$vsock_stream(r3, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @my=0x1}, 0xb6, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x6, 0x12000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0x7fffffff, 0x4) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) [ 1200.015060] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101510, &(0x7f0000000300)) 22:07:10 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x183102, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000000c0)={r1, 0x0, 0x7fffffff}) syz_emit_ethernet(0xaa, &(0x7f0000000700)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @remote, [], {@llc={0x4, {@llc={0xfe, 0xf8, "84", "8dbfed90438a5638cedf7313f21fcbffebb4317961cb83d06069e15d496c24fa1ef00152f9d4ee6bdd4f36075ed84ecf7c2f1c8aba05681b133c634ef35ed1ffc3a3e96ff3d3287445b3eb674f5b32dd6af2b9ffdaa72cbae804b6ae169826099c2fc04da4ccba35d07eb148e29f4407c28666371be1a369d1fbbf85dc9a7c6746f4b503670ceb1bf4e5f8a21f9275ea11d62e67ebc8e93b4d"}}}}}, &(0x7f0000000040)={0x0, 0x1, [0x543, 0xe54, 0xd7d, 0x6e]}) syz_emit_ethernet(0x0, &(0x7f00000001c0)=ANY=[], &(0x7f0000000100)={0x0, 0x3, [0x9df, 0x39, 0x4, 0x2d8]}) syz_emit_ethernet(0x2a4, &(0x7f0000000140)={@local, @local, [{[{0x9100, 0x4, 0x9, 0x3}], {0x8100, 0x401, 0x5, 0x2}}], {@ipv6={0x86dd, {0x80000000, 0x6, "f33957", 0x3cd, 0x2f, 0x9, @local, @mcast2, {[@srh={0x0, 0x6, 0x4, 0x3, 0xfffffffffffff001, 0x8, 0x1800, [@empty, @local, @local]}, @hopopts={0x2, 0x1e, [], [@pad1, @generic={0x8, 0x49, "084105ea316739f74390d6927487e81bc6f51449219f0f545737a6c8eff1d707b4fde3bf784f5e8af33e989e0886103af2000bcf7677c099d45cd43d6082c8ca583d96ef5536eab928"}, @pad1, @generic={0x7, 0x98, "cd3d56d3f9b957fc9157c2da6d833b59f1d9a6c0e71d861ab5ab01fb947ddb5af5c9ad0297d3d5511dacd3b65cbf1e7ce203d029161e4d7ac047151fbf6b04086e85a495c07666c364084c58e6f7ce2cbcfe324e2ce86524a563407ca96b9465cf5d613391286a609e3dfb1c00c7fa85e81d065f0aa3f46ee88543d2d1a858661b5787e7ab554960434f74a8feff8a1c24f08cab180dbec0"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x3}]}, @hopopts={0x2c, 0x2f, [], [@generic={0x0, 0xc8, "0d8289f47b50b5ee616f04f2429a67c537a8e619e318bcf4dd14a867a7d4e5d7c16c082444af7a9400f0c465b68035615dedccc3328b417e55f2294cd082e7dcbec36074b0d4c02dbecf7bc43eb27c9db9c41be6265d95c308f8ed771229e53b22b3e079ba21ec1828fc55faac4a615764ce368c91283779b9f71f9ebbfb6e240715ddcd64b0ae6cfc5abadb9403018bd8b1b3818171f9bd928282ce7c57da4ca7714080641a9c10e32baafd025b4e04ba48b0e32af14c7adb0eb73a6fe494337da11d1c82dd8d27"}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x12}}, @ra={0x5, 0x2, 0x1}, @jumbo={0xc2, 0x4, 0x80000001}, @ra={0x5, 0x2, 0xffffffffffffffff}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x19}}, @generic={0x9, 0x78, "62159df7cc4d0b3d750b9d7eaefb56a99dd8b758a64ee96463a3099b895d36f4c65c57ddf3cb3437c62e1101d82c8f163388b02e34b55eb7eb49cf9d8b22003d27f1f0b25173c8fd7874c6df37fc0028609512d42a873ae1d97be96fd0314c050a3e495ee208ea0c8afb85debfaf4d4d5f55d854de8a61ff"}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, @fragment={0xaf, 0x0, 0x3, 0x3, 0x0, 0x8d2, 0x68}, @srh={0x0, 0x0, 0x4, 0x0, 0x7, 0x50, 0x6331}, @dstopts={0x29, 0x1, [], [@pad1, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x1}]}, @routing={0x7e, 0x4, 0x1, 0x4, 0x0, [@mcast2, @empty]}, @fragment={0x88, 0x0, 0x7, 0xffffffff, 0x0, 0x8, 0x67}, @routing={0x67, 0xc, 0x2, 0x0, 0x0, [@remote, @empty, @loopback, @mcast1, @mcast2, @loopback]}], @udp={0x4e24, 0x4e23, 0x4d, 0x0, [@guehdr={0x1, 0x8, 0x5, 0x1f, 0x100}, @guehdr={0x2, 0x80000001, 0x4, 0x1ff, 0x100, [0x80]}, @guehdr={0x1, 0x2, 0x7f, 0x1, 0x100}], "572e7819f07a2dbcf3dd8336576765dffcd7a2896cf9c4ad9cbaf8a0b962d54b857350332ec5d892650a5432edfc463236e4d20619"}}}}}}, &(0x7f0000000000)={0x1, 0x1, [0x3d6, 0x85b, 0x8e9, 0xf6f]}) connect$vsock_dgram(r0, &(0x7f0000000680)={0x28, 0x0, 0xffffffff, @host}, 0x10) syz_emit_ethernet(0xaa, &(0x7f00000007c0)={@broadcast, @empty, [], {@llc={0x4, {@snap={0x0, 0xaa, "7deb", "fdfad2", 0x6005, "79ce38f2e4ed8acc0225e4fa233517e9bd4e736f2de071b4d8b22b551fc01813623e786e2824a183e03ecc474a30bcea702958466333bf7cb464d893db8ec649e0f1160a02effe96e4fcae28152a34389158dfe963de5861d7758c7a9b07f512a99deea4d54a89845ea3a9624695b276a163d4d2711be6630258f9ef4f161c0847af46a7392ac2f621f4db7f94d5da3e8b993d"}}}}}, 0x0) 22:07:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0xffffff7f, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xfeffffff, @loopback}, 0x10) 22:07:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000240)=r1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x4, 0x4000) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000200)=0x7ff) write$P9_RCREATE(r2, &(0x7f00000001c0)={0x18, 0x73, 0x2, {{0x41, 0x2, 0x5}, 0x855}}, 0x18) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) poll(&(0x7f0000000080)=[{r3}, {r0, 0x8}], 0x2, 0x3) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) accept4$vsock_stream(r3, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @my=0x1}, 0xb6, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x6, 0x12000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0x7fffffff, 0x4) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) 22:07:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109a07, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1201.149756] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:11 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0c0000000000010000000000ddfb762c20809902c2315d4f25cbad3d00000000"], &(0x7f0000000000)) 22:07:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x6000000000000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xf401, @loopback}, 0x10) 22:07:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108605, &(0x7f0000000300)) 22:07:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000240)=r1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x4, 0x4000) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000200)=0x7ff) write$P9_RCREATE(r2, &(0x7f00000001c0)={0x18, 0x73, 0x2, {{0x41, 0x2, 0x5}, 0x855}}, 0x18) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) poll(&(0x7f0000000080)=[{r3}, {r0, 0x8}], 0x2, 0x3) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) accept4$vsock_stream(r3, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @my=0x1}, 0xb6, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x6, 0x12000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0x7fffffff, 0x4) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) 22:07:12 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f00000000c0)=0x5, 0x4) 22:07:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10991c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xf7a75453ff, @loopback}, 0x10) [ 1202.243560] kauditd_printk_skb: 147 callbacks suppressed [ 1202.243577] audit: type=1400 audit(1541110032.882:31221): avc: denied { map } for pid=31367 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1202.339695] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1202.540698] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1202.592428] audit: type=1400 audit(1541110033.232:31222): avc: denied { map } for pid=31381 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0xfdffffff, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1202.709542] audit: type=1400 audit(1541110033.262:31223): avc: denied { map } for pid=31381 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000000b000)={&(0x7f0000000000), 0xc, &(0x7f00005a6ff0)={&(0x7f0000451ccc)=ANY=[@ANYBLOB="100100001a0001000000000000000000fe8000000000000000000000000000007f0074ee21dd6e6fdc1400010000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000002b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000014000e00ac1414aa0000000000000000000000000c0015000000000000000000"], 0x110}}, 0x0) 22:07:13 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f00000000c0)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) syz_emit_ethernet(0x56, &(0x7f0000000140)={@broadcast, @remote, [], {@canfd={0xd, {{0x3, 0xfffffffffffffff7, 0x0, 0x2}, 0x1c, 0x2, 0x0, 0x0, "5d37bd1b9994c9e160bdf88a154a40ce45d323bf7d700eb6d0c78f302ee7dd7f48b1baab63cbf7c7ebd1d659cc94dcdda651ca43a0e03e13c92fb974f912d694"}}}}, &(0x7f0000000040)={0x1, 0x2, [0x97f, 0x3c2, 0xd4, 0x5d1]}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) [ 1202.868967] audit: type=1400 audit(1541110033.282:31224): avc: denied { map } for pid=31381 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100323, &(0x7f0000000300)) [ 1202.981568] audit: type=1400 audit(1541110033.302:31225): avc: denied { map } for pid=31381 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x200003c0, @loopback}, 0x10) [ 1203.146638] audit: type=1400 audit(1541110033.332:31226): avc: denied { map } for pid=31384 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.271093] audit: type=1400 audit(1541110033.342:31227): avc: denied { map } for pid=31384 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.405059] audit: type=1400 audit(1541110033.342:31228): avc: denied { map } for pid=31381 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1203.510043] mip6: mip6_rthdr_init_state: state's mode is not 2: 0 [ 1203.609709] audit: type=1400 audit(1541110033.372:31229): avc: denied { map } for pid=31384 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:14 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200202, 0x0) 22:07:14 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000d80), 0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000440)=0x14) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1000, 0x2c0) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe, 0x3010040}, 0xc) 22:07:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ff05, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1203.766069] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1203.766469] audit: type=1400 audit(1541110033.382:31230): avc: denied { map } for pid=31384 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x700000000000000, @loopback}, 0x10) 22:07:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x3, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109e07, &(0x7f0000000300)) 22:07:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x442) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000080)={0x2, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e20, @multicast2}}}, 0x108) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONE(r0, 0x40049409, r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000340)=0xe8) sendmsg$nl_netfilter(r3, &(0x7f0000001680)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x1258, 0x4, 0x6, 0x400, 0x70bd2c, 0x25dfdbfd, {0x5, 0x0, 0x1}, [@generic="3ac5f1f35a9d8583884ae033695c46c6a8c2d78bfad9168918e5e5e6f29e172bbc9fc8a8be471ac3f497b35e1e5b14777c6d91bec3d242915100098faf99a14001c0cddd72196e551a423c9613bfaa9953d569319d8bfb4f7320e5e10e6f529a494673c287361a3f83886ea6", @nested={0x150, 0x37, [@generic="d4963f2ce20a07dd8dd95c129f5195e5e6cf187761a13f1b63a17d6b100bdc443057ca7023057ffcbb65724446fda3f59ae7f29563b9f5f07890cbddacbf3be0efba86ad651a125d98dcafd28bb02d9352133d03ea73ac4f6017d054d2083d8d1e373c69a96bcece7032922f8e5ab0d6a40fcad369b88104948942e5f653e99920a6442d741c9a91", @typed={0x8, 0x5e, @fd=r0}, @generic="025a0c0444b83b4051c88c6fbdc57c491562207f37b9359803d8c819c7", @generic="ff909dbf65b963a8b532f97a01b6ce0dc69cdfdac7b065bc3d4e5ddfe839db5ade9ae203d1a415b3da7015b01f6a98f53517cdf88e3ae2118fe203382ece0342429a5cf9d6bb3d660c4b701f479d9f9c2b700b572b5010fc405b356ed2a6a67a9aa104e16db553df0960da725dc3f162b76fcc43fdc950fa3e5dda1bb92b46280b7437781fe6e0ff4ae1f5483b4c4ecf9bec120150f4d8b50e342a01cc29f6"]}, @nested={0x14, 0x60, [@generic="8e619c0dc8e1e25fe06c8eb970224f29"]}, @generic="3ddb4f8e312f49a812d1ebc1889ac6c5ca671f6cd872b63b9548fe7975a06cade91f035e89b6c742cace87c735ea4b", @typed={0x8, 0x8c, @uid=r4}, @nested={0x1034, 0x51, [@typed={0x8, 0x30, @u32=0x3}, @typed={0xc, 0x6, @u64=0x8}, @generic="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", @typed={0xc, 0x29, @u64=0x9}, @generic="4292be40ec6b9bfce044a0657f35c099"]}, @typed={0x8, 0x8c, @ipv4=@broadcast}]}, 0x1258}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f00000000c0)) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 22:07:15 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aa03000022008c1645bf0aa896e39d34b6f9d129e20767b58d0c9e36d9e85900000000000000000000acade9be553e61438e615c0c84121562387779cb368a1b"], &(0x7f0000000080)) 22:07:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x20000000, @loopback}, 0x10) 22:07:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100012, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1204.931271] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x2, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:16 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000000001000000000000000000"], &(0x7f0000000000)) socketpair$inet6(0xa, 0x5, 0x3, &(0x7f00000010c0)={0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000001100)='tls\x00', 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xc1, 0x2000) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f00000000c0)=""/4096) 22:07:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10da0e, &(0x7f0000000300)) 22:07:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x733a663f, @loopback}, 0x10) 22:07:16 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x8}, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) sched_setaffinity(0x0, 0xffffffffffffffd9, &(0x7f0000000280)) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@local, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="6e444d33a51e9f2d9e9fd1be89f123ce", 0x10) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000380)={@dev, 0x0}, &(0x7f0000000540)=0x14) creat(&(0x7f0000000500)='./bus\x00', 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r7 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) signalfd(r0, &(0x7f0000000240), 0x8) ftruncate(r7, 0x2007fff) write$P9_RXATTRCREATE(r7, &(0x7f0000000140)={0x383}, 0x7) write$P9_RSETATTR(r7, &(0x7f0000000040)={0x7}, 0x7) sendfile(r3, r7, &(0x7f0000d83ff8), 0x800000000024) r8 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@mcast2, @in6=@ipv4={[], [], @multicast1}, 0x4e24, 0x9, 0x0, 0x0, 0x0, 0xa0, 0xa0, 0x7f, r4}, {0x101, 0x1, 0x19, 0x596d, 0x96f3, 0x6, 0x1, 0x5}, {0x7, 0x7ff}, 0x0, 0x6e6bbf, 0x2, 0x1, 0x0, 0x3}, {{@in=@loopback, 0x4d5, 0x3f}, 0x0, @in6=@loopback, 0x3507, 0x4, 0x2, 0x4, 0xa, 0x86, 0x100000000}}, 0xe8) fdatasync(r8) [ 1206.105129] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107e07, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x1f00000000000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xff0f, @loopback}, 0x10) [ 1206.611583] device lo left promiscuous mode [ 1206.726230] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:07:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10190e, &(0x7f0000000300)) [ 1206.922758] 8021q: adding VLAN 0 to HW filter on device team0 22:07:17 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB='\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'], &(0x7f0000000000)) [ 1207.247542] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1207.254260] kauditd_printk_skb: 160 callbacks suppressed [ 1207.254275] audit: type=1400 audit(1541110037.892:31391): avc: denied { map } for pid=31489 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1207.284571] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1207.380962] audit: type=1400 audit(1541110037.892:31392): avc: denied { map } for pid=31489 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xf4010000, @loopback}, 0x10) 22:07:18 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x8}, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) sched_setaffinity(0x0, 0xffffffffffffffd9, &(0x7f0000000280)) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@local, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="6e444d33a51e9f2d9e9fd1be89f123ce", 0x10) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000380)={@dev, 0x0}, &(0x7f0000000540)=0x14) creat(&(0x7f0000000500)='./bus\x00', 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r7 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) signalfd(r0, &(0x7f0000000240), 0x8) ftruncate(r7, 0x2007fff) write$P9_RXATTRCREATE(r7, &(0x7f0000000140)={0x383}, 0x7) write$P9_RSETATTR(r7, &(0x7f0000000040)={0x7}, 0x7) sendfile(r3, r7, &(0x7f0000d83ff8), 0x800000000024) r8 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@mcast2, @in6=@ipv4={[], [], @multicast1}, 0x4e24, 0x9, 0x0, 0x0, 0x0, 0xa0, 0xa0, 0x7f, r4}, {0x101, 0x1, 0x19, 0x596d, 0x96f3, 0x6, 0x1, 0x5}, {0x7, 0x7ff}, 0x0, 0x6e6bbf, 0x2, 0x1, 0x0, 0x3}, {{@in=@loopback, 0x4d5, 0x3f}, 0x0, @in6=@loopback, 0x3507, 0x4, 0x2, 0x4, 0xa, 0x86, 0x100000000}}, 0xe8) fdatasync(r8) 22:07:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x1f000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1207.539858] audit: type=1400 audit(1541110037.902:31393): avc: denied { map } for pid=31489 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103d14, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1207.699654] audit: type=1400 audit(1541110037.912:31394): avc: denied { map } for pid=31489 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1207.808339] audit: type=1400 audit(1541110037.992:31395): avc: denied { map } for pid=31489 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1207.945250] audit: type=1400 audit(1541110038.042:31396): avc: denied { map } for pid=31489 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.062769] audit: type=1400 audit(1541110038.082:31397): avc: denied { map } for pid=31489 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000000)=0x8, 0x4) read$eventfd(r1, &(0x7f00000001c0), 0x135) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) [ 1208.209889] audit: type=1400 audit(1541110038.102:31398): avc: denied { map } for pid=31489 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10750c, &(0x7f0000000300)) 22:07:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x40000000, @loopback}, 0x10) [ 1208.379659] audit: type=1400 audit(1541110038.112:31399): avc: denied { map } for pid=31489 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.523037] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1208.558744] audit: type=1400 audit(1541110038.232:31400): avc: denied { map } for pid=31494 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1208.764536] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x900000000000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = dup(r0) ioctl$TCXONC(r1, 0x540a, 0x7) r2 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000000)=0x2, 0x4) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x10001, 0x200000007, &(0x7f0000000140), 0xfffffdc9) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xfedf, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") write(r0, &(0x7f0000000080)="a161f31ea2e4050c5f29d4a04deb46d20d3e7962d9003708979ccbf43a6fb56c60582c24ee0128bb037f2bd279857f64b718e997b492bd50cc148ee6239cfb414ed47d94695529f61182194b50dc6f8ee8a3e65a46d2e0d9f7fa3957e619b33386561ed4742db7405569838475bba77123050a151da551b60eb758401330e05856ea7a9f2a83daad09", 0x89) 22:07:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x1e9a, @loopback}, 0x10) 22:07:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bb17, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:20 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x8}, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) sched_setaffinity(0x0, 0xffffffffffffffd9, &(0x7f0000000280)) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@local, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="6e444d33a51e9f2d9e9fd1be89f123ce", 0x10) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000380)={@dev, 0x0}, &(0x7f0000000540)=0x14) creat(&(0x7f0000000500)='./bus\x00', 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r7 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) signalfd(r0, &(0x7f0000000240), 0x8) ftruncate(r7, 0x2007fff) write$P9_RXATTRCREATE(r7, &(0x7f0000000140)={0x383}, 0x7) write$P9_RSETATTR(r7, &(0x7f0000000040)={0x7}, 0x7) sendfile(r3, r7, &(0x7f0000d83ff8), 0x800000000024) r8 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@mcast2, @in6=@ipv4={[], [], @multicast1}, 0x4e24, 0x9, 0x0, 0x0, 0x0, 0xa0, 0xa0, 0x7f, r4}, {0x101, 0x1, 0x19, 0x596d, 0x96f3, 0x6, 0x1, 0x5}, {0x7, 0x7ff}, 0x0, 0x6e6bbf, 0x2, 0x1, 0x0, 0x3}, {{@in=@loopback, 0x4d5, 0x3f}, 0x0, @in6=@loopback, 0x3507, 0x4, 0x2, 0x4, 0xa, 0x86, 0x100000000}}, 0xe8) fdatasync(r8) 22:07:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c006, &(0x7f0000000300)) [ 1209.896905] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xe, @loopback}, 0x10) [ 1210.120895] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x2d000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1210.321650] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:07:21 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, r2) r3 = inotify_init1(0x4) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x3, {0x8, 0xe2000, 0xb60, 0x1, 0x0, 0x5}, 0x9, 0x80000001}, 0xe) fcntl$setown(r3, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(r1, &(0x7f00000000c0)='net/sctp\x00') ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000100)={"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"}) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000000)=[{&(0x7f0000003640)=""/4096, 0x1774}], 0xa, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1bd, 0x0) 22:07:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100005, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x3, @loopback}, 0x10) 22:07:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b909, &(0x7f0000000300)) [ 1211.294080] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:22 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) 22:07:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x8, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b508, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xe803000000000000, @loopback}, 0x10) 22:07:22 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0xffffffff) 22:07:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10501f, &(0x7f0000000300)) [ 1212.479105] kauditd_printk_skb: 141 callbacks suppressed [ 1212.479120] audit: type=1400 audit(1541110043.112:31542): avc: denied { map } for pid=31592 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1212.616657] audit: type=1400 audit(1541110043.132:31543): avc: denied { map } for pid=31592 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1212.662937] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1212.770126] audit: type=1400 audit(1541110043.152:31544): avc: denied { map } for pid=31592 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1212.858299] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1212.888212] audit: type=1400 audit(1541110043.152:31545): avc: denied { map } for pid=31592 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1212.958923] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 22:07:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x3f00, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1212.987497] audit: type=1400 audit(1541110043.212:31546): avc: denied { map } for pid=31592 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x4000000000000000, @loopback}, 0x10) [ 1213.097829] audit: type=1400 audit(1541110043.252:31547): avc: denied { map } for pid=31592 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:23 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x381000, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x610101, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000100)=""/173) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 1213.183566] audit: type=1400 audit(1541110043.252:31548): avc: denied { map } for pid=31592 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:23 executing program 2: pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x40000000000000) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vsock\x00', 0x4000, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x370, 0x170, 0x0, 0x0, 0x170, 0x0, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4, &(0x7f0000000300), {[{{@ip={@broadcast, @loopback, 0xffffffff, 0x0, 'sit0\x00', 'bpq0\x00'}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local, 0x5, 0x1, [0x32, 0x0, 0x3d, 0x31, 0x0, 0x0, 0x37, 0x0, 0x3e, 0x39, 0x5, 0x1, 0x29, 0x17, 0x30], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1ff, 0x0, 0x0, 0x2], 0x0, 0x2550}, {0x8, [0x9, 0x80, 0x0, 0x7, 0x8, 0x7f]}}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xf}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) renameat(r1, &(0x7f0000000340)='./control\x00', r1, &(0x7f00000003c0)='./file1\x00') execve(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000001500), &(0x7f0000001480)) r2 = userfaultfd(0x80000) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x10}) write(r0, &(0x7f0000000a80)="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", 0x1000) vmsplice(r0, &(0x7f0000000380), 0x0, 0x0) [ 1213.359983] audit: type=1400 audit(1541110043.292:31549): avc: denied { map } for pid=31594 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10cd08, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1213.449741] audit: type=1400 audit(1541110043.312:31550): avc: denied { map } for pid=31594 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1213.569655] audit: type=1400 audit(1541110043.322:31551): avc: denied { map } for pid=31592 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a414, &(0x7f0000000300)) 22:07:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="6797c576ffdf53d4415af4e785cc3931", 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) fstat(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000300)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x4, 0x1, &(0x7f0000000440)=[{&(0x7f0000000380)="0789fea6f048bb2061177b88df89bb440331f01353bfd2717459bef63c42ae7d8c5f65108183eb2fd90a035de53581f0cd593fd4582493483e6e3af3d7dd8b4e18d5c56cd9979fc475c811697a321e8f09666b4e36ae6d6b607f5a3bd5f9b1a96fffe1ef784d26868f5c2f0233e62f2b3f003ca46f064b137449f38da391cbd840d7f76f105c65b7fdf9113d92d533e80ee7f245ac7a6da111baa69a5b74ae98f1d86d87e79af16217fa60bc7c", 0xad, 0x9}], 0x0, &(0x7f0000000580)={[{@norgrplvb='norgrplvb'}, {@noloccookie='noloccookie'}, {@lockproto_dlm='lockproto=dlm'}, {@localcaching='localcaching'}], [{@fowner_lt={'fowner<', r3}}, {@euid_gt={'euid>', r4}}]}) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000600)={0x3382e306, 0xe03f, 0x4}) write$P9_RXATTRWALK(r0, &(0x7f0000000640)={0xf, 0x1f, 0x2}, 0xf) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000680)={0x18, 0x0, {0x1, @broadcast, 'gretap0\x00'}}) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f00000006c0)) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000700)=0x1) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000740)={@remote, 0x7, 0x1, 0x1, 0x8, 0x9, 0x5, 0x4}, &(0x7f0000000780)=0x20) fsetxattr$security_evm(r2, &(0x7f00000007c0)='security.evm\x00', &(0x7f0000000800)=@ng={0x4, 0x2, "a4bdf85bc51728d0d524"}, 0xc, 0x3) mount$9p_unix(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x10, &(0x7f0000000900)={'trans=unix,', {[{@cache_fscache='cache=fscache'}, {@debug={'debug'}}, {@cache_fscache='cache=fscache'}, {@aname={'aname', 0x3d, "6e6f646576776c616e31a76d696d655f74797065"}}], [{@subj_type={'subj_type', 0x3d, 'vmnet0\\#mime_type]keyring'}}, {@smackfsdef={'smackfsdef', 0x3d, "2147504c4073656c665b5b2d262d657468302c6d696d655f747970656d643573756d2147504caa6e6f64657673656375726974797b26656d31"}}, {@obj_type={'obj_type', 0x3d, 'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@measure='measure'}, {@fowner_lt={'fowner<', r3}}, {@hash='hash'}, {@fsmagic={'fsmagic', 0x3d, 0x7f}}, {@uid_gt={'uid>', r4}}, {@subj_type={'subj_type', 0x3d, 'self}'}}]}}) r5 = socket$inet(0x2, 0x4, 0x4e6d) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000a80)={0x0, 0x8000}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000b00)={r6, 0x80000001, 0xb67a, 0x101, 0x401, 0xd953}, &(0x7f0000000b40)=0x14) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000b80)={0x1, 0x6, 0x20, 0xff, 0x8, 0x8001, 0x7, 0x7ff, 0x8, 0xd0}) ioctl$FICLONE(r0, 0x40049409, r5) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000c80)={r7, @in={{0x2, 0x4e21, @multicast1}}, [0x6, 0x400, 0x13, 0x7fffffff800, 0x80000000, 0x401c9172, 0x1fb0, 0x2, 0x1ff, 0x3, 0x800, 0x9, 0x2, 0x80000000, 0x2]}, &(0x7f0000000d80)=0x100) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000dc0)={r6, 0x80, 0x476eda34, 0x1ff, 0x8001, 0x8, 0x5, 0x3, {r8, @in={{0x2, 0x4e22, @loopback}}, 0x1, 0x1, 0x200, 0x3, 0x29}}, &(0x7f0000000e80)=0xb0) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) getsockopt$sock_int(r0, 0x1, 0x13, &(0x7f0000000ec0), &(0x7f0000000f00)=0x4) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000f40)=0x8, 0x4) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000f80)=0x10001, 0x4) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000fc0)={r0, 0x2, 0x101, r0}) 22:07:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x2000000000000000, @loopback}, 0x10) [ 1214.101505] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x4c, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0), 0x7f) socketpair$inet(0x2, 0xa, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000000c0)={0x0, 0x4, 0x99a}, 0xc) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x42) 22:07:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108c11, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x6000000, @loopback}, 0x10) [ 1215.113340] gfs2: invalid mount option: fowner<00000000000000000000 [ 1215.189712] gfs2: can't parse mount arguments 22:07:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c01c, &(0x7f0000000300)) [ 1215.314866] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1215.488953] 9pnet: p9_fd_create_unix (31659): problem connecting socket: ./file0: -111 [ 1215.491598] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1215.548827] gfs2: invalid mount option: fowner<00000000000000000000 [ 1215.587862] gfs2: can't parse mount arguments 22:07:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000800", @ANYRES16=r1, @ANYBLOB="0100000000000000000002000000"], 0x14}}, 0x0) 22:07:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x7a, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:26 executing program 3: r0 = getpgrp(0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$inet6(0xa, 0x80003, 0x800000000000006) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockname$inet6(r2, &(0x7f0000000580)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000540)=0x2dd) r3 = gettid() rt_sigprocmask(0x3, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_buf(r5, 0x0, 0x23, &(0x7f0000000780)=""/112, &(0x7f0000000800)=0x70) rt_tgsigqueueinfo(r0, r3, 0xb, &(0x7f0000000100)={0x0, 0x0, 0x3}) read(r4, &(0x7f0000481000)=""/128, 0x80) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000000)={0x400000000000, 0x8, 0x2, 0x0, 0x0, [{r5, 0x0, 0x4000000000}, {r1, 0x0, 0x70a3}]}) 22:07:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x6, @loopback}, 0x10) 22:07:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ac06, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e118, &(0x7f0000000300)) 22:07:27 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1f, &(0x7f0000000000)=0x8, 0x4) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) 22:07:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x1802000000000000, @loopback}, 0x10) [ 1216.640685] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:27 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x1, @broadcast, 'ip6_vti0\x00'}}, 0x1e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@get={0x1, &(0x7f0000000140)=""/199, 0x9}) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000100)) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000240)=0x10000) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x4, {0x0, @remote, 'ip_vti0\x00'}}) [ 1216.869858] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x500000000000000, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:28 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001640)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000001780)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[]) write$vnet(r0, &(0x7f00000004c0)={0x1, {&(0x7f00000003c0)=""/247, 0xb870ca92, &(0x7f0000000280)=""/118, 0x3, 0x2}}, 0x39f) write$vnet(r0, &(0x7f0000000340)={0x1, {&(0x7f0000000200)=""/84, 0x54, &(0x7f0000001940)=""/4096, 0x0, 0x2}}, 0x68) open_by_handle_at(r1, &(0x7f00000000c0)={0xbf, 0x7, "669aa9dd51ee80c44bac39c2609a3b973b8924e52d838d2485387989caa2b41499efdc42489cb58f44a4acb6e53e2924a7e84fdc90c626111093f01de5003c3376ae8f3803e8d4a4b5e6e20a14988b601f2ffb82ce077e21e43a26979ff328ba2cade17b0dd0eace201263ea9f1c998477f74e98686e89e1a48d6f2346136efadb06c85c880de14b22b37e21adb8f0d4b95009f415ada8a7f82f879507a69889cb37d8546992404d22f8db11b431272f707af96ca6e39d"}, 0x2000) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) modify_ldt$write(0x1, &(0x7f0000000180)={0xd2, 0xffffffffffffffff, 0x1000, 0x3b257bdd, 0x4, 0x6, 0x7, 0x9c17, 0x8, 0x1}, 0x10) 22:07:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10350f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x200000000000000, @loopback}, 0x10) [ 1217.560268] kauditd_printk_skb: 157 callbacks suppressed [ 1217.560284] audit: type=1400 audit(1541110048.202:31709): avc: denied { map } for pid=31707 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103b11, &(0x7f0000000300)) 22:07:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) fstat(r0, &(0x7f0000000080)) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x0, 0x300) prctl$setptracer(0x59616d61, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000040)) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f0000000280)={0x48, "7f666e7490470df6f838a7507199249ada4ae59bb4373ae187e4f3ba8cb7351a", 0x1, 0xffffffffffffffc6, 0x2, 0x20, 0x1000000, 0x2}) syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x8080, 0x0) [ 1217.742795] audit: type=1400 audit(1541110048.202:31710): avc: denied { map } for pid=31707 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1217.859691] audit: type=1400 audit(1541110048.222:31711): avc: denied { map } for pid=31707 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.042716] audit: type=1400 audit(1541110048.232:31712): avc: denied { map } for pid=31707 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.099557] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xff0f000000000000, @loopback}, 0x10) [ 1218.187533] audit: type=1400 audit(1541110048.302:31713): avc: denied { map } for pid=31707 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.284255] audit: type=1400 audit(1541110048.302:31714): avc: denied { map } for pid=31707 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:29 executing program 2: mknod(&(0x7f0000000a00)='./file0\x00', 0x461, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000006c0), &(0x7f00000002c0)) [ 1218.401933] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1218.463054] audit: type=1400 audit(1541110048.302:31715): avc: denied { map } for pid=31707 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x6b6b6b, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1218.656657] audit: type=1400 audit(1541110048.372:31716): avc: denied { map } for pid=31707 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103e06, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1218.860784] audit: type=1400 audit(1541110048.372:31717): avc: denied { map } for pid=31707 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1218.987678] audit: type=1400 audit(1541110048.412:31718): avc: denied { map } for pid=31712 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xa000000, @loopback}, 0x10) 22:07:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101d00, &(0x7f0000000300)) 22:07:30 executing program 2: r0 = socket(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) sendmmsg$alg(r0, &(0x7f00000092c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="fe74", 0x2}], 0x1, &(0x7f0000000380)}], 0x1, 0x0) 22:07:30 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff51, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/sco\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x9) [ 1219.643752] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2000000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x9a1e0000, @loopback}, 0x10) 22:07:30 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c00000600000007000000"}, 0x20) 22:07:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10190e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x347, @loopback}, 0x10) 22:07:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101d13, &(0x7f0000000300)) 22:07:31 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400), 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="39000000130009006900000000000000ab00804803000000447f0107000000141800290073130000006455c4726e0000000400000306000000", 0x39}], 0x1) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000200)=ANY=[], 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000040)}], 0x34b, 0x0) 22:07:31 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000000)={0x2, 0x3, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x7, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x78}}, 0x0) [ 1221.372926] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x400000000000000, @loopback}, 0x10) 22:07:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x4000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:32 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102005ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') exit(0x0) getdents64(r0, &(0x7f0000000080)=""/57, 0x3f6) 22:07:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d307, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c10f, &(0x7f0000000300)) 22:07:32 executing program 3: 22:07:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x18000000, @loopback}, 0x10) [ 1222.617999] kauditd_printk_skb: 157 callbacks suppressed [ 1222.618016] audit: type=1400 audit(1541110053.252:31876): avc: denied { map } for pid=31809 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1222.789107] audit: type=1400 audit(1541110053.282:31877): avc: denied { map } for pid=31809 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1222.932467] audit: type=1400 audit(1541110053.342:31878): avc: denied { map } for pid=31809 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:33 executing program 3: [ 1223.067913] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1223.087384] audit: type=1400 audit(1541110053.352:31879): avc: denied { map } for pid=31809 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103f0e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1223.231750] audit: type=1400 audit(1541110053.392:31880): avc: denied { map } for pid=31814 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x3000000, @loopback}, 0x10) 22:07:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103d14, &(0x7f0000000300)) 22:07:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x97ffffff00000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1223.368672] audit: type=1400 audit(1541110053.392:31881): avc: denied { map } for pid=31814 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:34 executing program 2: [ 1223.436706] audit: type=1400 audit(1541110053.452:31882): avc: denied { map } for pid=31814 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1223.618717] audit: type=1400 audit(1541110053.462:31883): avc: denied { map } for pid=31814 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1223.749657] audit: type=1400 audit(1541110053.502:31884): avc: denied { map } for pid=31814 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:34 executing program 3: [ 1223.909654] audit: type=1400 audit(1541110053.542:31885): avc: denied { map } for pid=31814 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:34 executing program 2: 22:07:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x9a1e, @loopback}, 0x10) 22:07:35 executing program 3: 22:07:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10df1c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10401b, &(0x7f0000000300)) 22:07:35 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='pagemap\x00') sendfile(r1, r2, &(0x7f0000000040)=0x500, 0x10000000000443) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x70, 0x6, 0x800, 0x1, 0xce7d, 0x0, 0x6, 0x8, 0xa, 0x1, 0x8, 0x6d1, 0x401, 0x0, 0x1, 0x0, 0xffffffffffffff05, 0x101, 0xcd, 0x8, 0x5, 0x68, 0xffffffff7fffffff, 0x0, 0x8, 0x4, 0x4, 0x0, 0x5, 0x8, 0x0, 0xffffffff, 0x1000, 0x3, 0x81, 0x3f, 0x7, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x20001, 0x0, 0x7, 0x7, 0x8130, 0x4, 0x3f}, 0x0, 0x5, 0xffffffffffffff9c, 0x8) sigaltstack(&(0x7f0000804000/0x1000)=nil, &(0x7f0000000000)) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) [ 1224.872239] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x3000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xc0030020, @loopback}, 0x10) 22:07:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="27171d80c07257d78bf6a732491811", 0xf) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 22:07:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10380d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103b09, &(0x7f0000000300)) 22:07:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xe803, @loopback}, 0x10) 22:07:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000700)=@broute={"62726f58746500000000000000000300", 0x20, 0x1, 0x1c8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000780], 0x0, &(0x7f0000000000), &(0x7f0000000780)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, "626373881300", 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0x70, 0xe8, 0x138}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x1, 0x3, 0x99, 0x0, 0x0, "8371b5cfbedd8ed133b7fffa22d0ff860c62d2627417f0b46e71d3e2b2fa9b24d85d62d6a09401b9e841aa8117dffc70c16bfd66d43c01c335f323a65104d1a7"}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x240) 22:07:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='io.stat\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000240), &(0x7f0000000300)=0x4) write$cgroup_int(r0, &(0x7f0000000100), 0x715371) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x4, 0x10, 0x6, 0x80000001}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x0, 0x5, 0x200, 0x6, 0x1, 0x3, 0x8001, 0x8, r2}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000280), &(0x7f0000000200)=0x4) [ 1226.629729] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x2, @loopback}, 0x10) 22:07:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x200000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000033000/0x3000)=nil, 0x3000, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x8000000000004002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1'}, 0x3e00406000) 22:07:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f818, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c016, &(0x7f0000000300)) 22:07:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x500, @loopback}, 0x10) 22:07:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) fstat(r0, &(0x7f0000000080)) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x0, 0x300) prctl$setptracer(0x59616d61, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000040)) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f0000000280)={0x48, "7f666e7490470df6f838a7507199249ada4ae59bb4373ae187e4f3ba8cb7351a", 0x1, 0xffffffffffffffc6, 0x2, 0x20, 0x1000000, 0x2}) syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x8080, 0x0) [ 1227.620740] kauditd_printk_skb: 153 callbacks suppressed [ 1227.620757] audit: type=1400 audit(1541110058.262:32039): avc: denied { map } for pid=31912 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1227.834248] audit: type=1400 audit(1541110058.312:32040): avc: denied { map } for pid=31916 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1227.964927] audit: type=1400 audit(1541110058.322:32041): avc: denied { map } for pid=31916 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1228.114800] audit: type=1400 audit(1541110058.372:32042): avc: denied { map } for pid=31912 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:38 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000100)=""/4096) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r1, 0x540b, 0xb9d) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000080)={0x1, 0x800}) [ 1228.293038] audit: type=1400 audit(1541110058.382:32043): avc: denied { map } for pid=31912 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x600000000000000, @loopback}, 0x10) [ 1228.379683] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10aa0b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1228.433605] audit: type=1400 audit(1541110058.742:32044): avc: denied { map } for pid=31930 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10471a, &(0x7f0000000300)) [ 1228.564584] audit: type=1400 audit(1541110058.742:32045): avc: denied { map } for pid=31930 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1228.705787] audit: type=1400 audit(1541110058.802:32046): avc: denied { map } for pid=31930 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1228.842023] audit: type=1400 audit(1541110058.812:32047): avc: denied { map } for pid=31930 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1229.006809] audit: type=1400 audit(1541110058.882:32048): avc: denied { map } for pid=31930 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) process_vm_writev(0x0, &(0x7f0000000500), 0x0, &(0x7f0000002680)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x0) 22:07:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x300000000000000, @loopback}, 0x10) 22:07:40 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x64242, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000340)={0x9, [0x1ff, 0x23d, 0x400, 0x3, 0x6, 0x7fffffff, 0x8, 0x7f, 0x1, 0x59, 0x10000, 0x2, 0x2, 0x1, 0x5, 0x9, 0x5, 0x100000001, 0x8, 0x6, 0x2, 0x2c, 0x100000001, 0x5, 0xa9da, 0x40, 0x100, 0x5, 0x8, 0xaa3, 0x1, 0x100, 0x10001, 0x7, 0x1, 0x9, 0xfffffffffffffffa, 0x7fffffff, 0x7b, 0x8, 0xe6a, 0x3, 0x0, 0x878, 0xef, 0x0, 0x80, 0x6], 0xf}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) r4 = msgget(0x3, 0x8) msgctl$MSG_INFO(r4, 0xc, &(0x7f0000000400)=""/102) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) fcntl$getown(r2, 0x9) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000140)=""/59) fallocate(r1, 0x1, 0x0, 0x81000f3) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000240)) 22:07:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c41e, &(0x7f0000000300)) 22:07:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x105506, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:40 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_tables_matches\x00') getdents64(r0, &(0x7f0000000040)=""/69, 0x45) close(r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') 22:07:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x9a1e000000000000, @loopback}, 0x10) [ 1230.446436] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x4c, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10301d, &(0x7f0000000300)) 22:07:41 executing program 2: r0 = socket$inet6(0xa, 0x8000040000080804, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) 22:07:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x91ffffff, @loopback}, 0x10) 22:07:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102409, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x4, @loopback}, 0x10) 22:07:42 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f00000000c0)={0xacabe22cc2efc3dd, 0x51b6, 0x0, 0x4, {0xfb, 0xe08, 0x58a5, 0x4}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) [ 1232.026882] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xffffff7f, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x9, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e20, @multicast2}, 0x1, 0x7, 0x2, 0x9, 0x2, 0x0, 0x9, 0x4, 0x3}) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {}, 0x0, {0x2, 0x0, @remote}}) 22:07:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d311, &(0x7f0000000300)) [ 1232.641360] kauditd_printk_skb: 167 callbacks suppressed [ 1232.641376] audit: type=1400 audit(1541110063.282:32216): avc: denied { map } for pid=32020 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1232.764832] audit: type=1400 audit(1541110063.322:32217): avc: denied { map } for pid=32023 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x4002000000000000, @loopback}, 0x10) 22:07:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108b0c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1232.945106] audit: type=1400 audit(1541110063.332:32218): avc: denied { map } for pid=32026 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1233.099964] audit: type=1400 audit(1541110063.332:32219): avc: denied { map } for pid=32022 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1233.258833] audit: type=1400 audit(1541110063.332:32220): avc: denied { map } for pid=32026 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1233.411943] audit: type=1400 audit(1541110063.352:32221): avc: denied { map } for pid=32026 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:44 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcs\x00', 0x884, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x10, &(0x7f0000000240)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}]}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000300)={r1, 0x80}, 0x8) r2 = socket$inet(0x2, 0xa, 0x1000) sendmmsg(0xffffffffffffffff, &(0x7f0000003440)=[{{&(0x7f0000000180)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000480)="24cf9e88a8c89aff2786e944ce8d60062041c7aad6e862544c534ae3f863595b87dfcd1bb411f7b624cef7a26cfbc2f8e4cae0080d833f92a12769a864a79d99acef880090142658a462f92161285becf12d4ae9fff453d5138dc78dfa4676882cbeed58c2b8f3b4", 0x68}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="38c95e8d000000000000000008c2f800000080d07a4ad25722c96e9bb4c4a65ef1c6121e9b60ddb7479a4446c7139f274b9f5e10"], 0x34}, 0x7ff}], 0x1, 0x0) sendmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x277, &(0x7f0000000200)}}, {{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)="1508aed0c874c99b1fcfd09d772fb2546de3d5d83ede62277e7fc6583f4b4bacde5989be83be2f3bda52ea607fcc07393dc7a436271fd84f1bb6abbc7858d822d9e4bf8bf27ad8122342456b3820738ac12e61e955f8715addfff53490096759b5b461f966abdd5111daf403635c91d6613a9c9faa8c48c1eae2b737a359ba628f802cbcdc69edb7a58705ca407c13c429746e3887c228b4ea5fc12ae36f659a217328157e5a68221760ad2a340ba56f", 0xb0}], 0x1, &(0x7f0000000480)}}], 0x2, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r1, 0xb46}, 0x8) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x2, 0x1000}) 22:07:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r3, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r4, 0x28, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40001) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e21, 0x6, @local, 0x400}}}, 0x84) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000500)={0x7, 0x10001, 0x5, 0x0, 0x1d}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) [ 1233.618415] audit: type=1400 audit(1541110063.362:32222): avc: denied { map } for pid=32026 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xff0f0000, @loopback}, 0x10) [ 1233.865406] audit: type=1400 audit(1541110063.362:32223): avc: denied { map } for pid=32023 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1234.008289] audit: type=1400 audit(1541110063.382:32224): avc: denied { map } for pid=32020 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d91b, &(0x7f0000000300)) [ 1234.156663] audit: type=1400 audit(1541110063.392:32225): avc: denied { map } for pid=32020 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1234.279791] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1234.367266] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:07:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x600, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:45 executing program 2: r0 = eventfd2(0x7, 0x80001) r1 = socket$inet6(0xa, 0x800, 0x400000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0xc0880, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r4, &(0x7f0000000040)="e0070057fb3c70b5bd6c7d13104aeaffeca2a56eb11ba1b92187b77c89feec88", &(0x7f0000000200)=""/181}, 0x18) syz_open_pts(r4, 0x40) io_setup(0x1, &(0x7f0000000100)=0x0) r6 = getpid() r7 = getpgrp(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r3, &(0x7f0000000300)={r4, r3, 0xfffffffffffffffa}) io_submit(r5, 0x1, &(0x7f00000002c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x80000001, r1, 0xfffffffffffffffe, 0x0, 0x8001, 0x0, 0x1, r0}]) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000140)={'teql0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x6, 0x0, 0x709000}}) 22:07:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x4000000, @loopback}, 0x10) 22:07:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d70d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r3, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r4, 0x28, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40001) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e21, 0x6, @local, 0x400}}}, 0x84) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000500)={0x7, 0x10001, 0x5, 0x0, 0x1d}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 22:07:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xa00, @loopback}, 0x10) 22:07:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a313, &(0x7f0000000300)) [ 1235.651274] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:46 executing program 2: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x800, 0x30) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r0, r1, 0x5, 0xe) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local, @local, {[], @tcp={{0x2b00, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)={0x0, 0x41, [0x0, 0x4d3]}) 22:07:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x3b00, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f503, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x218, @loopback}, 0x10) 22:07:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104b18, &(0x7f0000000300)) 22:07:47 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x3000082042, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(r1, r0) socket$inet_udplite(0x2, 0x2, 0x88) 22:07:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xa, @loopback}, 0x10) 22:07:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r3, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r4, 0x28, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40001) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e21, 0x6, @local, 0x400}}}, 0x84) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000500)={0x7, 0x10001, 0x5, 0x0, 0x1d}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) [ 1237.423721] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:48 executing program 2: mkdir(&(0x7f0000771000)='./file0\x00', 0x0) mount(&(0x7f0000900ff8), &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000ebcffe)) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5a, 0x103000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x8}}, 0x30) r1 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x4) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1000000000000, 0x44034, 0xffffffffffffffff, 0x0) mq_timedsend(r1, &(0x7f0000000000)="f6", 0x1, 0x0, 0x0) 22:07:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10cb13, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x3ff7f8, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1237.709476] kauditd_printk_skb: 175 callbacks suppressed [ 1237.709492] audit: type=1400 audit(1541110068.342:32401): avc: denied { map } for pid=32132 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x18, @loopback}, 0x10) [ 1237.881911] audit: type=1400 audit(1541110068.372:32402): avc: denied { map } for pid=32132 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10241c, &(0x7f0000000300)) [ 1238.039798] audit: type=1400 audit(1541110068.392:32403): avc: denied { map } for pid=32132 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.165892] audit: type=1400 audit(1541110068.402:32404): avc: denied { map } for pid=32132 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.316414] audit: type=1400 audit(1541110068.442:32405): avc: denied { map } for pid=32132 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1238.455196] audit: type=1400 audit(1541110068.472:32406): avc: denied { map } for pid=32132 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:49 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40000, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000001640)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f0000000000)}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x2, 0x101800) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x8000bd1, 0x3}) ioctl(r1, 0x2285, &(0x7f0000007000)='S') sendmsg$unix(r0, &(0x7f0000001140)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xffffffffffffff66, &(0x7f0000000040)=[{&(0x7f00000016c0)="53dbcbb348ea897b626b0ec461196d3d307e4c24b2a0ca5d2f8d55fa7abce1fb23dbf6d7b3c1cb7df062293ebf3a203aa720a058a383578a2e2112fa6e58d1ef794f1e7e01e539fe6dd3bb060d9b9f1b9ab7c4f310112ce912df63052d80c4849232f4b4f324579688e6dceb93268782f0dcd7c3a5dbd948173145124594b790777abd2dd8d8a3d2be7d8b6e44acd7937eb702e4dfe80829df17304f505b1c2e8be1e20363b955c6725f9ef4316ef1a38128e2f56148005ecd1f770d3802c5f55074cb339f9bd9a37caee7ab5a383411eaf7885509153761454750cd5ad8430c48dd820c4b560f1fc052c89880e5ddd89d01b5595fa92b2dc541f5a2611808888c0b3097bb8dbdc4f5ce55e06e1c71762cfc5d2d6e8bf37b294346df96d8e8a527834d63b0e6941f489659c71f205eb09e1121bb1d39af9f37671437e3c9413faab5516b22485578a4eaa46f76f949f36b127c4cb52f882f94ba19d70cf74024d6b37e44c0f3a35b6877e525f99ea5eb1d574a730c5fc9f190179e69383bec37fab5547a4781dfa81cf91631247fd07280e061e591cf10cda220bbcfba910189dac9100388746ddd6c043db0bcd9b2de6d81688947eaf751a471501f0d02422cc1234707522162451b278655e8a62c0d9c0f0b907a9a9a86e6619e249b8672a0956ad38cb15a788ebac5a80117d36d2e5d2e13a2c92deadf64f79e537c51aee78b8978f8a1c9a9de0c6f93fbdd9d01a8466c647535b6829cd4f2f2ff27d223c8c7f62df8acf028886c97471aba15a101980789fe58f8093b3064d349815da9be6a05bec25b5f4666a269a727532f2c0c8ccec681b6868b9565f1909834a2339dcf36c5c4363eabeb9aa37f7af1793471a223d830e48b50d2e9be7160e2da9ac9c6142efe34d8ddba54b9565da4587594579a0ef8fe9f0b0dca2ff38589f56e4ac29f5e63cacbce7da15d26c96a59ac9b409fbc2014b45d80bdcf0a6b30805d451061355bad9f808037815de3469584330998e6ece22b6a7977603acbea9f37a4885a3ce3691e6d580372d0e3d07319f058984eb274b98457a6eb14f95c3401f80f4032775b1ff45c3f02ecd0c16df5300f6e7fda41a12777fe837dcbfea293521c119f03110f59fe4bbc9e4c375be40ebf4f4c370ee4516dcfbd64a1f3fe22eade1b14d5546717ca8ef9fc542e5e3546c0205e1e6b878d0ba7980b083f5bb8b918bc66810f734a8163bad2feb4a619609a2c6433502abad42fe0821653d91e5bf4f086881778ab986943859181408b38dae7cf4c38e477142169f13927e5972049a90631415317b0f86e9e697fd3e9da5c3eeb149253fa6337bb3533c1aa7d834fbfe37d14b710c5f7a3f50409d66c7b9c5bd442bb77911198d6ea961f33cc7ee85e122e6ec1d487738d915e4bbb12b885ea3fceb379eb0f78bf418a74d1fcf4ba689bd627e296f05ce49cd1d20e136e7a77c97a61537198ce9022fad20499b6535675d1fca4e6439f84d965722bb0306127a21a9dab95405fe9e03ad3a9fc7a7993dcfd9186730c3378be7c74612c8019f2bddd023e477bc12c4c78a6dd45c1cf3918ffe71565997a3a93e8a54104fe257c329c3791101e7356b9f9d1d86ee056c725112379b2276b76fb3d2bf5dbb7637eeedf8020b4dbfd3d8c07ee2afef53d99aa2bac7e4a1a7dc890456954f224ee0f2bbdb7cce97da28907d30cb270b810220322533d3f9506b63626acf51b20a627f0c808648af9836803d7dea39f338fcb59091a9831e5cbee338eee95c72419f75611cd7acf9eb666131b54b905d557e44d0a9981f68d6d9f88ace4216c3d937789b08b846254bf664fcc52305323d0b0d37719e2d4a91a2c74688f5637a24e3a4357fd661d5ea3d950c305a9cf398a9e0a0c380a0499b230cdb0adec9a5412c74651b615de19f848721ab176593cc14b6a19fdf79b867dadfc0de59b0d55304e135aa10f8d631cf806918b3893200fc58043ab91905bda11a3f154b6e72e30a2ff33f575e782e4d018ee3c4edfbad27753424798eb42d4f992bb652470be159cb716b2398af2b289d0d0a1210d0be055903a31014d4d377488bc7a25130ae57455544c0d126e7689cd8900ca5110102daf0740b3fdf43d09f9851769db7a1a5f1792ed91ad524ebc285b7486b510cd1f289864e52bc70c55d092ee3d93611442f8e05d94e52e48a3d2495661a4bcfc77f49d689b4a59f7b46a59a3beabf07ea5f28feeabf46c7f04c2939b5bd520006168b219d1ed91ec34379b7e18625523c96dbd85241a7d58f3ba4182aae054bdae9e6d344d063afd94194429c4e4d4b48ac5cc6c6e9069179fa7cf117f5161aca52010fe88522ce8f55d79bc3b68f547b2df1def41d1f045bb4b769b503060c20c9f91b968821afba24d8d4f69cef9ac8f5556818e13ac6f21723898abe640f72e9c9e2c17d2052d45727512a520328713f1c7cc4120c1a3f16e5995e90569d20a8679cdff357ee472c7f87fdc81b58fff0c3028f58ffb31c910e8b0155f1913c58ac31138ab2a1adf0292af66aba41ff9dddf644d62cd511429dd455ff6a48317654b1e9c2aebe57eca7e3f72824ae3ed3ffc02f295cec2fa8b49fc43f13abbd8af0c281f90bf5ab393b1286280ef175772352ce96fa4f8ff508c5584edb93971d3063f7cb1881de19f9e63efe774cc475e29f296a1c5a14d616b747de7b5848802dfae4117aa958b0837264922a09beffd1e771ce6f50539b963238c74f29352be1828f3db8320126bf96335a54328085e56a797827a626dbdfe03a9a68f4417a8524e1c15915a6c2e58d4a601168f0b883dadb97beefd33d7fdaea5c530f707569d595c9cfbd347e2c2107c18350cd23d7befb482194efc6003465f96532de34253c8133763f5c484760c20d474b6cbdb3cfc9b2a5eb4ebb0a3b3bc728cf9b0330ee1b29b9942d9d1a302596adb19d96bb159300aa075b208cb499183937893f580b000e7d2d7bb80a3b3d8bd0c99d26a9d9ed572df7c830e0838de734e0f40efd71a57b17cf9c8923fcae9e601fb3251319b24abfa2bef2bf60007abe4ebc0e4c6c43cf0987a0ca604291f6d665a7717f08aa2ad97af581fa493fc69230203a217ef64add22a3dd5387c85e198bc0110443d42713476db54eea3448a62f1c67692a4add2800e7cb2e7c2e87e5a1a0ae315c1de862c31023b40d82507adbbb01b87c500e564e45bad9438179b0de2d72545df2a4ce2b61fbe7d1341ddda42ac63f7e471cf7dbc9c8ab06d155843e3823ac3e1dcc0a78467fc1c21f261cba352690754cfa157a32661c248d4eff99fea78004f02743f8bb033668d08c33de69f5339b18faeef133cab87a7cb47129284c41d753ffb189be8a430b912f2d1d123967cd54a008dbf7e15bd6fe3829347ec1f54257c25029122a6d89ec08e6919607e6fcec5109078f66e6b6983528fd12abde7b95a0bb3930656a3481b5a293f09833f101b62084a4309480713eb817a7439cf005f09a5d27bca2abc693e1b0990074fc1eecb8e15167ab7de8bb856a950ef6829457374cd6fe72665aa9d03e31ce99156d9891cb83939618afac6a29db9ce92a3abf5eb9d9dbfd020ad092f60a1f04d39baad6df5221822b3b98405e3a0030b8f67ec32eb7a9a8d5a13a59c5a8cd588dff76d1a13b3c0d0c22309f0d62c8f17c0d0bd9e8b7b230f680e04e601f588d15cecfd47866e7243e3a53ecf0f231b42ee33a8fdec7440f1e63d1f74f6d4d88c31ada3f0dd205eb1518d87a89cac60931700a8b4787021c97ae16f7c437afa0107c01667db62c6a831099ca7438512d8a0d866854280c1b8fdec16ca22c7aa6ee7a02ce26f14aa0a7c0627f4fbaaa7221582fade8b584b41267a61fac16a4c5427b1db026e64ba9414a26b3a4d5bc1a3746ce8f67e410c7bbf8a6fa4178e16b4a51adeee8174741146d311f77afb0d743404703974d7ddcc5df31dc8a63fd0bef7517d202872d53b560146c63070e52d90aaee24484911bc663d1b76cc5932a7b962e7faae9d625d75d86ebfa73da2976766239e1c4ef498f6cad0c5a0f2b35417a634a2fa390f5c26041ce7be273b67fba9ceb46745ec8684c180807c731b00b4beb1659a7624ad073e8102f73098ba69f2542858d93d80a4b2592bfa06b4b562b8584cdad9326a9d69da0f67bb7b49047bffa2170ec954b1f446824796bfc4674fc879c2ed07698344ffa94fe6e520ade3b9c8cb1344631d6fd7f91892267d6c150fba5ca116ba25a90da8e6e1be71d14cb36d25143d5855a20c849bcbca8f6985fc61edecac75fe121941ced476d00eb0cd72f5d818bc2da1fc5001fd3b1d8f960cba7c7d1fe4df4975983de00ed01d00f74f9bf29d91a5941c4f5638c0a61b5b38043ac201ef471f94c5c6bbc25ced2cd7b56a96c4c70712db52dc91cff970f182dcd856b07e92bd6d6e7e6f8457ff0d91d13fb9092f0a30337d88ae747521a816c3d67f679f3f09c763217f7faa67a0f09cdf34047fc1acdbdb8fccb878b1d70c67dc18aa00a3ada33057891d75852057e4c7fee99b79a250dc05ef8cd73602c386108a51adf9efc456a662d9adf8104db4ed03dfeea7a2b8f57e277316cd50d396e829c495f0a51774a678253e7d14ca882a7e6b909b95265123e0e3c631e8b38fcfecbd6e62f14a4f0aaea46b68cf0b3fe1aea5aa6214dc3b0879425d713b933c869fe295c25495f7faa81f50a08a759813c8bf465f4143360289343682f90365b45587b23410cf6aaa18db35120452b645473dc079b6c3ab54dd706876cb1b5929dea70a9a180a564de90504fde02af6b3b6220e72b08513ad4f2d7ca97d2eba4415f45f3150f764ee6ddb051f10cc5f0de83bcedd5b7f93bd5427380c4e9b9f3a41927958306b8219316320ded57629b6d0b0a1ca747244220bde351bb9c2511dd65a10a096890e034057888104b62acbfc10d66e796f41cac1638e6ba975e72b12b1e62c28a5af2516e1dc0921782b7025a968484ad0127a5a2e87f7d660a5615de808fa76a48d0c9e2ae741318acb9d99406e63a87491e6c9720bba3149ce2ce91728ee61be2c22ed99f0412a035e50ca02ff049a4ead8a21258c66af44d13a2982e4ef6dea2a17c1fa06823566297af1aedc5540956a3575a844bb0f663fa3f2bd3cd293f89280caad7f19433e1031429ad5ac96690c538806949a0a9aa774d29a0258e748c3f4bc1f4a7ca0cdc9ade1a799f44da04d9cae14f760581407220ed783ee7221464f7fb01465e3030535fe09998c34824713e92ad41160b14e7f674f435f37e2f0b3a763dd42ad8a010b27066540d31311bc78b5793098c88da9339c50df35dd91c0496bca2f5c46551b2f9272930804347cde8e93b4158954441b254d16eb7a289b98cfb3a84eba28a34bf962ab4a53a97d997660e904b89b55ef463a5e28fe1af4c0776a1b07e637d10cd8becba7563c539604674114c1ec881460f3a41b0ef426b05fa3a030376f4fa5ba1e7915be0d0bfa872cee36c43616386010cd9f909f18d9e01114c64e48ee489c1f51afcf000cc3281fbbad80c4af14d75d29418e64b473d9a61f10a2ad6f3318fa439b1e4b4c28f2a1448006811f3593dbaac3b74b6678e426fcb30e5a4e60ce5139b11d7523bfe826df803c2de4dd09a3b2978acf3119ed28b43b566404a276c2f4e44b8f3fe1230d5b7168ce16008637b53837017f987dd589fdf7d575e5017aab5ec99ae5e7817819cbfb8097aea9eaa3ff8b1d66e0fe6c682a3f4025f5bcf0c1882f9d", 0x1000}], 0x1, 0x0, 0x0, 0x20008000}, 0x8040) [ 1238.612099] audit: type=1400 audit(1541110068.512:32407): avc: denied { map } for pid=32132 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100180, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1238.776705] audit: type=1400 audit(1541110068.572:32408): avc: denied { map } for pid=32132 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x500000000000000, @loopback}, 0x10) [ 1238.930553] audit: type=1400 audit(1541110068.582:32410): avc: denied { map } for pid=32137 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1239.064052] audit: type=1400 audit(1541110068.582:32411): avc: denied { map } for pid=32137 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r3, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r4, 0x28, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40001) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e21, 0x6, @local, 0x400}}}, 0x84) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000500)={0x7, 0x10001, 0x5, 0x0, 0x1d}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) [ 1239.376203] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:50 executing program 2: r0 = socket(0x12, 0x7fffd, 0xaa) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f0000000240), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x20000000, 0x4000000000003, 0x2, @thr={&(0x7f0000000080), &(0x7f0000000100)}}) 22:07:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107706, &(0x7f0000000300)) 22:07:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x50000, @loopback}, 0x10) 22:07:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f21b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:50 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) shutdown(r0, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f00000000c0)=@ethtool_ringparam={0x11, 0x0, 0x10001, 0x0, 0xf00}}) 22:07:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x4002, @loopback}, 0x10) 22:07:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108510, &(0x7f0000000300)) [ 1240.818080] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:51 executing program 2: mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="2c6673636f6e5165f8743d756e636f6e66aa197b22"]) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) socket$inet_udp(0x2, 0x2, 0x0) [ 1241.027506] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100f1b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xff5354a7f7000000, @loopback}, 0x10) 22:07:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r3, 0x28, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40001) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000280)={r4, @in6={{0xa, 0x4e21, 0x6, @local, 0x400}}}, 0x84) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000500)={0x7, 0x10001, 0x5, 0x0, 0x1d}) 22:07:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xfffffffd, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:52 executing program 2: r0 = inotify_init1(0x0) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x89, 0x10040) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000001c0)=""/82) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000080)={@local, @loopback}, &(0x7f00000000c0)=0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000240)) ptrace(0x4207, r2) ptrace$getregset(0x4205, r2, 0x20000000000202, &(0x7f0000000000)={&(0x7f0000000840)=""/4096, 0xfffffe3e}) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x7, 0x200000) ptrace$getregset(0x4204, r2, 0x207, &(0x7f0000000800)={&(0x7f00000007c0)}) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000140)=0x8000) 22:07:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10970d, &(0x7f0000000300)) 22:07:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x40020000, @loopback}, 0x10) 22:07:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10da02, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1242.710063] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={r1, 0xffffffffffffffff, 0x0, 0x5}, 0x3ac) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000004c0)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(r0, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000540)) r2 = socket$kcm(0xa, 0x5, 0x0) r3 = getpgid(0xffffffffffffffff) ptrace$setregset(0x4205, r3, 0x1, &(0x7f00000003c0)={&(0x7f0000000280)="08e0a4332a79e5c59a59ffe8c720642296cccd16135751159105ecb85c26", 0x1e}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x11) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000400)={0x5, 0x400}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='cgroup.type\x00', 0x2, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000500)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000002500)='syz1\x00', 0x1ff) 22:07:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x7000000, @loopback}, 0x10) 22:07:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r3, 0x28, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40001) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000280)={r4, @in6={{0xa, 0x4e21, 0x6, @local, 0x400}}}, 0x84) 22:07:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1242.943330] kauditd_printk_skb: 165 callbacks suppressed [ 1242.943349] audit: type=1400 audit(1541110073.582:32576): avc: denied { map } for pid=32255 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.119713] audit: type=1400 audit(1541110073.582:32577): avc: denied { map } for pid=32255 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e20c, &(0x7f0000000300)) [ 1243.230967] audit: type=1400 audit(1541110073.582:32578): avc: denied { map } for pid=32255 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.340083] audit: type=1400 audit(1541110073.622:32579): avc: denied { map } for pid=32255 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.493068] audit: type=1400 audit(1541110073.662:32580): avc: denied { map } for pid=32255 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.621349] audit: type=1400 audit(1541110073.682:32581): avc: denied { map } for pid=32255 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1243.778269] audit: type=1400 audit(1541110073.682:32582): avc: denied { map } for pid=32255 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x300, @loopback}, 0x10) [ 1243.937040] audit: type=1400 audit(1541110073.702:32583): avc: denied { map } for pid=32255 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102d13, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:54 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000200)={0x1, 0x6, 0x101, 'queue0\x00', 0x8402}) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x1, 0xfffffffffffffffa, 0x802, 0x2, 0x7, 0x16}) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000100)=""/225) [ 1244.081758] audit: type=1400 audit(1541110073.722:32584): avc: denied { map } for pid=32255 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1244.226472] audit: type=1400 audit(1541110073.742:32585): avc: denied { map } for pid=32255 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102313, &(0x7f0000000300)) [ 1244.780950] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r3, 0x28, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40001) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000280)={r4, @in6={{0xa, 0x4e21, 0x6, @local, 0x400}}}, 0x84) 22:07:55 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x400) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000000c0)=r1) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(&(0x7f0000000200)=@nullb='/dev/nullb0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000240)='devpts\x00', 0x0, &(0x7f0000000000)="4f5ae57a473bb20255c3b04755a4076ba856e4f2a25c60319e68") 22:07:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x1802, @loopback}, 0x10) 22:07:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10cb1d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1245.593479] devpts: called with bogus options [ 1245.672790] devpts: called with bogus options 22:07:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100d0e, &(0x7f0000000300)) 22:07:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x3f00, @loopback}, 0x10) 22:07:56 executing program 2: fstat(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="8201c682ac853d19d4a50dc5ae4d74d6508703a4beb9af6103b42c441193c03b4a3bdb7db8ebc6988598090bb3584d3152625334790a27401cc355d144f00a754a450b2977405f928e583fb1f4861afb6cfc9aabbe17cb45d35681387e88c30991903be0e8790fabad89529e65fbff96afbf3dbdc66297e32e258fba6a013af7a24628a0693047a5b0c1f0e706135dd196adfeb0165f989821ba2448d0ac3c6330faffdce66c75abfc2da420f615d33ab9baba", 0xb3, 0x1}], 0x1000, &(0x7f0000000240)={[{@max_inline={'max_inline', 0x3d, [0x75, 0x30, 0x0, 0x75, 0x65, 0x7d]}}, {@device={'device', 0x3d, './file0'}}, {@fragment_all='fragment=all'}, {@inode_cache='inode_cache'}, {@inode_cache='inode_cache'}, {@ssd='ssd'}, {@clear_cache='clear_cache'}, {@autodefrag='autodefrag'}, {@space_cache_v1='space_cache=v1'}], [{@fowner_gt={'fowner>', r0}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@subj_role={'subj_role'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) 22:07:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100008, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r3, 0x28, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40001) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000080)=0x8) 22:07:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xf401000000000000, @loopback}, 0x10) 22:07:57 executing program 2: syz_emit_ethernet(0x369, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getpeername$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) [ 1246.641428] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:07:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10401e, &(0x7f0000000300)) 22:07:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x7a00000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x733a663f00000000, @loopback}, 0x10) 22:07:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100f17, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:07:57 executing program 2: syz_emit_ethernet(0x369, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getpeername$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 22:07:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r3, 0x28, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40001) 22:07:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x2000000, @loopback}, 0x10) 22:07:58 executing program 2: syz_emit_ethernet(0x369, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getpeername$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) 22:07:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101817, &(0x7f0000000300)) [ 1248.101256] kauditd_printk_skb: 131 callbacks suppressed [ 1248.101271] audit: type=1400 audit(1541110078.742:32717): avc: denied { map } for pid=32366 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109c0b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1248.251445] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1248.290105] audit: type=1400 audit(1541110078.742:32718): avc: denied { map } for pid=32366 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1248.431539] audit: type=1400 audit(1541110078.742:32719): avc: denied { map } for pid=32366 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x48000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1248.613878] audit: type=1400 audit(1541110078.742:32720): avc: denied { map } for pid=32366 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0xe00, @loopback}, 0x10) [ 1248.756691] audit: type=1400 audit(1541110078.812:32721): avc: denied { map } for pid=32366 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:59 executing program 2: syz_emit_ethernet(0x369, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getpeername$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) [ 1248.908843] audit: type=1400 audit(1541110078.862:32722): avc: denied { map } for pid=32366 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1249.088578] audit: type=1400 audit(1541110078.902:32723): avc: denied { map } for pid=32366 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106b1b, &(0x7f0000000300)) [ 1249.198890] audit: type=1400 audit(1541110078.962:32724): avc: denied { map } for pid=32370 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:07:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r3, 0x28, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40001) [ 1249.380095] audit: type=1400 audit(1541110078.962:32725): avc: denied { map } for pid=32370 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1249.480646] audit: type=1400 audit(1541110078.972:32726): avc: denied { map } for pid=32366 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f007f01}, 0x10) 22:08:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10dd1d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:00 executing program 2: syz_emit_ethernet(0x369, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) socket$inet_sctp(0x2, 0x1, 0x84) [ 1250.199823] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6b6b6b, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0xac141419}, 0x10) 22:08:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a71e, &(0x7f0000000300)) 22:08:01 executing program 2: syz_emit_ethernet(0x369, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) 22:08:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') 22:08:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ca11, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:02 executing program 2: syz_emit_ethernet(0x369, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 22:08:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f00000b}, 0x10) 22:08:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100f15, &(0x7f0000000300)) 22:08:02 executing program 2: syz_emit_ethernet(0x369, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 22:08:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f00000d}, 0x10) 22:08:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6b6b6b00, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10720d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) 22:08:03 executing program 2: syz_emit_ethernet(0x369, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 22:08:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f000005}, 0x10) 22:08:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100e18, &(0x7f0000000300)) [ 1253.398594] kauditd_printk_skb: 162 callbacks suppressed [ 1253.398610] audit: type=1400 audit(1541110084.032:32889): avc: denied { map } for pid=32472 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:04 executing program 2: syz_emit_ethernet(0x369, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 1253.564962] audit: type=1400 audit(1541110084.072:32890): avc: denied { map } for pid=32472 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1253.604884] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1253.702562] audit: type=1400 audit(1541110084.092:32891): avc: denied { map } for pid=32472 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f000009}, 0x10) [ 1253.857404] audit: type=1400 audit(1541110084.102:32892): avc: denied { map } for pid=32472 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x74, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1254.023192] audit: type=1400 audit(1541110084.172:32893): avc: denied { map } for pid=32472 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109e0a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) [ 1254.191326] audit: type=1400 audit(1541110084.202:32894): avc: denied { map } for pid=32472 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1254.340663] audit: type=1400 audit(1541110084.202:32895): avc: denied { map } for pid=32472 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c013, &(0x7f0000000300)) [ 1254.482903] audit: type=1400 audit(1541110084.262:32896): avc: denied { map } for pid=32472 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:05 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1254.680063] audit: type=1400 audit(1541110084.272:32897): avc: denied { map } for pid=32472 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1254.799996] audit: type=1400 audit(1541110084.322:32898): avc: denied { map } for pid=32472 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f000004}, 0x10) [ 1254.869825] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2c, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') 22:08:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c316, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10400b, &(0x7f0000000300)) 22:08:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f000008}, 0x10) 22:08:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1256.167341] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x7400000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ad03, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102c17, &(0x7f0000000300)) 22:08:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f000007}, 0x10) 22:08:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) 22:08:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') 22:08:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104006, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f00000a}, 0x10) 22:08:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x1000bc, &(0x7f0000000300)) 22:08:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) semget$private(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xffffff7f00000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1258.402483] kauditd_printk_skb: 160 callbacks suppressed [ 1258.402499] audit: type=1400 audit(1541110089.042:33059): avc: denied { map } for pid=32575 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1258.601848] audit: type=1400 audit(1541110089.042:33060): avc: denied { map } for pid=32570 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f000300}, 0x10) [ 1258.771054] audit: type=1400 audit(1541110089.142:33061): avc: denied { map } for pid=32575 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1258.914350] audit: type=1400 audit(1541110089.182:33062): avc: denied { map } for pid=32575 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1259.079663] audit: type=1400 audit(1541110089.192:33063): avc: denied { map } for pid=32575 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(r1, 0x6e101439f0ff95ce, 0x12, &(0x7f0000000340)=""/153) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x55df, 0x101000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB="825b9ee9623a6a"], 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') 22:08:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106a00, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1259.241907] audit: type=1400 audit(1541110089.212:33064): avc: denied { create } for pid=32566 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1259.275952] EXT4-fs (sda1): re-mounted. Opts: [ 1259.387291] EXT4-fs (sda1): re-mounted. Opts: [ 1259.400445] audit: type=1400 audit(1541110089.232:33065): avc: denied { write } for pid=32566 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1259.531006] audit: type=1400 audit(1541110089.242:33066): avc: denied { map } for pid=32575 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a601, &(0x7f0000000300)) 22:08:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f000501}, 0x10) [ 1259.663789] audit: type=1400 audit(1541110089.272:33067): avc: denied { map } for pid=32575 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1259.757606] audit: type=1400 audit(1541110089.332:33068): avc: denied { map } for pid=32575 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x3b000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f000017}, 0x10) 22:08:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bb1c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ad03, &(0x7f0000000300)) 22:08:11 executing program 2 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f000002}, 0x10) [ 1261.407450] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000580), &(0x7f00000005c0)=0x30) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x8, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:12 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d311, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c801, &(0x7f0000000300)) 22:08:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback=0x7f000003}, 0x10) [ 1262.501551] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:13 executing program 2: syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1262.689946] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x500, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x5]}, 0x10) 22:08:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108112, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:14 executing program 2: syz_emit_ethernet(0xfffffdef, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e201, &(0x7f0000000300)) [ 1263.707643] kauditd_printk_skb: 148 callbacks suppressed [ 1263.707658] audit: type=1400 audit(1541110094.342:33217): avc: denied { map } for pid=32680 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1263.811453] audit: type=1400 audit(1541110094.352:33218): avc: denied { map } for pid=32680 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1263.939363] audit: type=1400 audit(1541110094.382:33219): avc: denied { map } for pid=32680 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xff0f000000000000]}, 0x10) 22:08:14 executing program 2: syz_emit_ethernet(0xfdef, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1264.073455] audit: type=1400 audit(1541110094.392:33220): avc: denied { map } for pid=32680 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1264.145583] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1264.183989] audit: type=1400 audit(1541110094.442:33221): avc: denied { map } for pid=32680 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1264.310347] audit: type=1400 audit(1541110094.482:33222): avc: denied { map } for pid=32680 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xf5ffffff, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1264.435787] audit: type=1400 audit(1541110094.492:33223): avc: denied { map } for pid=32680 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1264.550188] audit: type=1400 audit(1541110094.542:33224): avc: denied { map } for pid=32680 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108003, &(0x7f0000000300)) [ 1264.734318] audit: type=1400 audit(1541110094.542:33225): avc: denied { map } for pid=32680 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104a11, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x18000000]}, 0x10) [ 1264.882069] audit: type=1400 audit(1541110094.612:33226): avc: denied { map } for pid=32686 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:15 executing program 2: syz_emit_ethernet(0x22, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x5000000]}, 0x10) 22:08:16 executing program 2: syz_emit_ethernet(0x140, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107e15, &(0x7f0000000300)) 22:08:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101414, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:16 executing program 2: syz_emit_ethernet(0xd, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xf401]}, 0x10) 22:08:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d41f, &(0x7f0000000300)) 22:08:17 executing program 2: syz_emit_ethernet(0x200001be, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x4000000]}, 0x10) 22:08:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102400, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:18 executing program 2: syz_emit_ethernet(0x7ffff000, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xe000000]}, 0x10) 22:08:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102406, &(0x7f0000000300)) 22:08:19 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x80b, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104f11, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1268.718624] kauditd_printk_skb: 143 callbacks suppressed [ 1268.718640] audit: type=1400 audit(1541110099.352:33370): avc: denied { map } for pid=316 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1268.850822] audit: type=1400 audit(1541110099.402:33371): avc: denied { map } for pid=316 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1269.000180] audit: type=1400 audit(1541110099.402:33372): avc: denied { map } for pid=316 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x18020000]}, 0x10) [ 1269.157964] audit: type=1400 audit(1541110099.402:33373): avc: denied { map } for pid=316 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1269.229714] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:19 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x82f, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1269.372781] audit: type=1400 audit(1541110099.492:33374): avc: denied { map } for pid=318 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6c, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1269.492414] audit: type=1400 audit(1541110099.492:33375): avc: denied { map } for pid=316 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1269.634436] audit: type=1400 audit(1541110099.512:33376): avc: denied { map } for pid=318 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100008, &(0x7f0000000300)) [ 1269.754485] audit: type=1400 audit(1541110099.542:33377): avc: denied { map } for pid=318 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1269.828408] audit: type=1400 audit(1541110099.542:33378): avc: denied { map } for pid=316 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:20 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x8035, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1270.019666] audit: type=1400 audit(1541110099.542:33379): avc: denied { map } for pid=318 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a71e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x1802]}, 0x10) 22:08:21 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(0xffffffffffffffff, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1270.529839] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:21 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x8847, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xffffff97, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10960b, &(0x7f0000000300)) 22:08:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xe803]}, 0x10) 22:08:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102e0e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x808, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x4002]}, 0x10) 22:08:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d905, &(0x7f0000000300)) 22:08:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x900000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b60d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:23 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x830, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xc0030020]}, 0x10) 22:08:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bb12, &(0x7f0000000300)) 22:08:24 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x802, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x2000]}, 0x10) [ 1273.787569] kauditd_printk_skb: 144 callbacks suppressed [ 1273.787584] audit: type=1400 audit(1541110104.422:33524): avc: denied { map } for pid=419 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1273.933419] audit: type=1400 audit(1541110104.432:33525): avc: denied { map } for pid=419 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10930b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1274.062293] audit: type=1400 audit(1541110104.462:33526): avc: denied { map } for pid=419 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1274.119639] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1274.219763] audit: type=1400 audit(1541110104.482:33527): avc: denied { map } for pid=419 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1274.310683] audit: type=1400 audit(1541110104.562:33528): avc: denied { map } for pid=419 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:25 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x806, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1274.459702] audit: type=1400 audit(1541110104.622:33529): avc: denied { map } for pid=419 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xffffffff00000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1274.578775] audit: type=1400 audit(1541110104.632:33530): avc: denied { map } for pid=419 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1274.706820] audit: type=1400 audit(1541110104.662:33531): avc: denied { map } for pid=424 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x7]}, 0x10) [ 1274.860054] audit: type=1400 audit(1541110104.662:33532): avc: denied { map } for pid=424 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104003, &(0x7f0000000300)) 22:08:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1274.985549] audit: type=1400 audit(1541110104.662:33533): avc: denied { map } for pid=424 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:26 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x900, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x3e8]}, 0x10) 22:08:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108f17, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1275.777040] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:26 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x2400, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xf6ffffff00000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e81a, &(0x7f0000000300)) 22:08:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x4603000000000000]}, 0x10) 22:08:27 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x8100, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100f0c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:27 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x4305, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f919, &(0x7f0000000300)) 22:08:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x300000000000000]}, 0x10) 22:08:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1277.796066] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x600000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:28 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x811, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x40020000]}, 0x10) 22:08:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108b13, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104019, &(0x7f0000000300)) 22:08:29 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x829, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x91ffffff]}, 0x10) [ 1278.957400] kauditd_printk_skb: 153 callbacks suppressed [ 1278.957415] audit: type=1400 audit(1541110109.592:33687): avc: denied { map } for pid=520 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1279.089645] audit: type=1400 audit(1541110109.592:33688): avc: denied { map } for pid=520 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1279.207111] audit: type=1400 audit(1541110109.602:33689): avc: denied { map } for pid=520 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d900, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1279.334009] audit: type=1400 audit(1541110109.602:33690): avc: denied { map } for pid=520 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:30 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x814, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1279.488777] audit: type=1400 audit(1541110109.602:33691): avc: denied { map } for pid=520 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xa00]}, 0x10) [ 1279.616907] audit: type=1400 audit(1541110109.632:33692): avc: denied { map } for pid=520 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1279.711308] audit: type=1400 audit(1541110109.652:33693): avc: denied { map } for pid=520 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108817, &(0x7f0000000300)) 22:08:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6000000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1279.879950] audit: type=1400 audit(1541110109.692:33694): avc: denied { map } for pid=520 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1280.071140] audit: type=1400 audit(1541110109.692:33695): avc: denied { map } for pid=520 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:30 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x803, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1280.240653] audit: type=1400 audit(1541110109.782:33696): avc: denied { map } for pid=520 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xa00000000000000]}, 0x10) 22:08:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bc08, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:31 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x8906, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101f09, &(0x7f0000000300)) 22:08:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x47030000]}, 0x10) [ 1281.412827] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x3f00, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:32 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x83a, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x1000000]}, 0x10) 22:08:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109f08, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:32 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x804, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109e1c, &(0x7f0000000300)) 22:08:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x500]}, 0x10) 22:08:33 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x83c, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100d0e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1283.132262] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x700, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x3]}, 0x10) 22:08:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100114, &(0x7f0000000300)) 22:08:34 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x807, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1284.137556] kauditd_printk_skb: 155 callbacks suppressed [ 1284.137570] audit: type=1400 audit(1541110114.772:33852): avc: denied { map } for pid=623 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109d09, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1284.265688] audit: type=1400 audit(1541110114.782:33853): avc: denied { map } for pid=623 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xfeffffff00000000]}, 0x10) [ 1284.416275] audit: type=1400 audit(1541110114.792:33854): avc: denied { map } for pid=623 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x82b, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1284.544074] audit: type=1400 audit(1541110114.802:33855): avc: denied { map } for pid=623 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1284.627178] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1284.699371] audit: type=1400 audit(1541110114.832:33856): avc: denied { map } for pid=623 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f207, &(0x7f0000000300)) [ 1284.870635] audit: type=1400 audit(1541110114.862:33857): avc: denied { map } for pid=623 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1284.984562] audit: type=1400 audit(1541110114.872:33858): avc: denied { map } for pid=623 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1285.120845] audit: type=1400 audit(1541110114.882:33859): avc: denied { map } for pid=623 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x8848, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1285.266859] audit: type=1400 audit(1541110114.882:33860): avc: denied { map } for pid=623 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1285.428709] audit: type=1400 audit(1541110115.002:33861): avc: denied { map } for pid=623 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x3f000000]}, 0x10) 22:08:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101116, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:36 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x80d, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xc003002000000000]}, 0x10) 22:08:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e60a, &(0x7f0000000300)) [ 1286.421444] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:37 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x500, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1286.630472] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x1000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xe00]}, 0x10) 22:08:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103c02, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d116, &(0x7f0000000300)) 22:08:38 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x82c, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xffffff91]}, 0x10) 22:08:38 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x821, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 22:08:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10401d, &(0x7f0000000300)) 22:08:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101718, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x100000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:39 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xe]}, 0x10) [ 1289.170491] kauditd_printk_skb: 161 callbacks suppressed [ 1289.170507] audit: type=1400 audit(1541110119.812:34023): avc: denied { map } for pid=721 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1289.318149] audit: type=1400 audit(1541110119.822:34024): avc: denied { map } for pid=721 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:40 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1289.442939] audit: type=1400 audit(1541110119.862:34025): avc: denied { map } for pid=721 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1289.595342] audit: type=1400 audit(1541110119.872:34026): avc: denied { map } for pid=721 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103d1c, &(0x7f0000000300)) 22:08:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x347]}, 0x10) [ 1289.698101] audit: type=1400 audit(1541110120.332:34027): avc: denied { map } for pid=736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1289.788362] audit: type=1400 audit(1541110120.332:34028): avc: denied { map } for pid=736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1289.891677] audit: type=1400 audit(1541110120.332:34029): avc: denied { map } for pid=736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1290.037831] audit: type=1400 audit(1541110120.332:34030): avc: denied { map } for pid=736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1290.125451] audit: type=1400 audit(1541110120.412:34031): avc: denied { map } for pid=736 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:40 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a809, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1290.217534] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1290.274943] audit: type=1400 audit(1541110120.452:34032): avc: denied { map } for pid=736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6800, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xe803000000000000]}, 0x10) 22:08:41 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x4, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ef1e, &(0x7f0000000300)) 22:08:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xf401000000000000]}, 0x10) 22:08:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109301, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:42 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x9, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(0xffffffffffffffff, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) [ 1292.124353] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:42 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0xdc, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100e09, &(0x7f0000000300)) 22:08:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xa, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:08:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x1800000000000000]}, 0x10) 22:08:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106909, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:43 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xffffffff00000000]}, 0x10) [ 1293.315759] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1293.488033] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x20000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:44 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x2, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104a02, &(0x7f0000000300)) 22:08:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x1f4]}, 0x10) 22:08:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 22:08:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100016, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:44 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x3, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1294.378808] kauditd_printk_skb: 148 callbacks suppressed [ 1294.378824] audit: type=1400 audit(1541110125.012:34181): avc: denied { map } for pid=830 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1294.501776] audit: type=1400 audit(1541110125.092:34182): avc: denied { map } for pid=830 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1294.607474] audit: type=1400 audit(1541110125.092:34183): avc: denied { map } for pid=830 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1294.721598] audit: type=1400 audit(1541110125.092:34184): avc: denied { map } for pid=830 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x240]}, 0x10) 22:08:45 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88ffffff, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b805, &(0x7f0000000300)) [ 1294.917276] audit: type=1400 audit(1541110125.132:34185): avc: denied { map } for pid=830 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:45 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='pagemap\x00') sendfile(r1, r2, &(0x7f0000000040)=0x500, 0x10000000000443) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x70, 0x6, 0x800, 0x1, 0xce7d, 0x0, 0x6, 0x8, 0xa, 0x1, 0x0, 0x6d1, 0x401, 0x0, 0x1, 0x0, 0xffffffffffffff05, 0x101, 0xcd, 0x8, 0x5, 0x68, 0xffffffff7fffffff, 0x0, 0x8, 0x4, 0x4, 0x20, 0x5, 0x8, 0x0, 0xffffffff, 0x1000, 0x3, 0x81, 0x3f, 0x7, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x20001, 0x0, 0x7, 0x7, 0x8130, 0x4, 0x3f}, 0x0, 0x5, 0xffffffffffffff9c, 0x8) sigaltstack(&(0x7f0000804000/0x1000)=nil, &(0x7f0000000000)) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) [ 1295.015102] audit: type=1400 audit(1541110125.202:34186): avc: denied { map } for pid=830 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.178438] audit: type=1400 audit(1541110125.202:34187): avc: denied { map } for pid=830 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.334733] audit: type=1400 audit(1541110125.242:34188): avc: denied { map } for pid=830 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.480138] audit: type=1400 audit(1541110125.272:34189): avc: denied { map } for pid=830 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1295.531733] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1295.615909] audit: type=1400 audit(1541110125.292:34190): avc: denied { map } for pid=830 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x5000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:46 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x7000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f505, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x40000000]}, 0x10) 22:08:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102206, &(0x7f0000000300)) 22:08:47 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2c, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"00ac720000000000ec973f820f7c4000", 0x101}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x35}}, 0x0) close(r0) 22:08:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xf4010000]}, 0x10) 22:08:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ef09, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:48 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xd, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1297.413198] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10441a, &(0x7f0000000300)) [ 1297.621547] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:08:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x4000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x46030000]}, 0x10) 22:08:48 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x600000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106205, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10000e, &(0x7f0000000300)) 22:08:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x300]}, 0x10) 22:08:49 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3a, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1299.134878] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1299.384923] kauditd_printk_skb: 143 callbacks suppressed [ 1299.384938] audit: type=1400 audit(1541110130.022:34334): avc: denied { map } for pid=927 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1299.492931] audit: type=1400 audit(1541110130.092:34335): avc: denied { map } for pid=927 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1299.634502] audit: type=1400 audit(1541110130.112:34336): avc: denied { map } for pid=927 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1299.793759] audit: type=1400 audit(1541110130.112:34337): avc: denied { map } for pid=927 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1299.951198] audit: type=1400 audit(1541110130.132:34338): avc: denied { map } for pid=928 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1300.049660] audit: type=1400 audit(1541110130.132:34339): avc: denied { map } for pid=928 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1300.169661] audit: type=1400 audit(1541110130.192:34340): avc: denied { map } for pid=927 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1300.270836] audit: type=1400 audit(1541110130.192:34341): avc: denied { map } for pid=928 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1300.389826] audit: type=1400 audit(1541110130.202:34342): avc: denied { map } for pid=927 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1300.460136] audit: type=1400 audit(1541110130.202:34343): avc: denied { map } for pid=928 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:08:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, &(0x7f0000000340), 0x28e, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:08:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2d00000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x4788, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x50000]}, 0x10) 22:08:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104002, &(0x7f0000000300)) 22:08:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c209, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x600, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x4000]}, 0x10) 22:08:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10380d, &(0x7f0000000300)) 22:08:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e40e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:52 executing program 3: mknod(&(0x7f0000000100)='./file0\x00', 0x103f, 0x0) r0 = gettid() setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000000c0), 0x4) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000002c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000003c0)) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/143, 0x8f}], 0x1, &(0x7f0000001540)=[{&(0x7f0000001400)=""/90, 0x5a}], 0x1, 0x0) tkill(r0, 0x1000000000016) [ 1301.473231] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:52 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88caffff00000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xa000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x3f663a73]}, 0x10) 22:08:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='ns\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040), 0x1d2d8e16) 22:08:53 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x86ddffff, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10621c, &(0x7f0000000300)) 22:08:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10321b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xf7a75453ff]}, 0x10) 22:08:53 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x6000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1303.219731] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:54 executing program 3 (fault-call:5 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:08:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x4c00, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a900, &(0x7f0000000300)) 22:08:54 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x43050000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x200000000000000]}, 0x10) 22:08:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c700, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1304.384365] FAULT_INJECTION: forcing a failure. [ 1304.384365] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.418206] kauditd_printk_skb: 143 callbacks suppressed [ 1304.418222] audit: type=1400 audit(1541110135.052:34487): avc: denied { map } for pid=1037 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1304.445151] CPU: 1 PID: 1036 Comm: syz-executor3 Not tainted 4.19.0+ #93 [ 1304.452747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.462495] Call Trace: [ 1304.465122] dump_stack+0x244/0x39d [ 1304.468772] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1304.473985] ? mark_held_locks+0x130/0x130 [ 1304.478235] ? mark_held_locks+0x130/0x130 [ 1304.482502] should_fail.cold.4+0xa/0x17 [ 1304.486575] ? flex_array_get_ptr+0x49/0x60 [ 1304.490912] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1304.496121] ? context_struct_compute_av+0x1600/0x1600 [ 1304.501422] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1304.506455] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1304.511665] ? zap_class+0x640/0x640 [ 1304.514515] audit: type=1400 audit(1541110135.082:34488): avc: denied { map } for pid=1037 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1304.515392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1304.515415] ? constraint_expr_eval.isra.6+0x2d7/0x1560 [ 1304.548362] ? zap_class+0x640/0x640 [ 1304.552092] ? find_held_lock+0x36/0x1c0 [ 1304.556488] ? find_held_lock+0x36/0x1c0 [ 1304.560578] __should_failslab+0x124/0x180 [ 1304.564838] should_failslab+0x9/0x14 [ 1304.568667] kmem_cache_alloc+0x47/0x730 [ 1304.572752] ? trace_hardirqs_on+0xbd/0x310 [ 1304.577089] ? kasan_check_read+0x11/0x20 [ 1304.580369] audit: type=1400 audit(1541110135.082:34489): avc: denied { map } for pid=1037 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1304.581273] ? avc_compute_av+0x2c5/0x800 [ 1304.609187] ? trace_hardirqs_off_caller+0x310/0x310 [ 1304.614316] avc_alloc_node+0x2a/0x600 [ 1304.618231] avc_compute_av+0x2d1/0x800 [ 1304.622234] ? avc_has_perm+0xe4/0x7e0 [ 1304.626150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1304.631708] ? avc_alloc_node+0x600/0x600 [ 1304.635869] ? kasan_check_read+0x11/0x20 [ 1304.638792] audit: type=1400 audit(1541110135.082:34490): avc: denied { map } for pid=1037 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1304.640038] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1304.640056] ? rcu_softirq_qs+0x20/0x20 [ 1304.640072] ? kasan_check_read+0x11/0x20 [ 1304.640093] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1304.664066] audit: type=1400 audit(1541110135.082:34491): avc: denied { map } for pid=1037 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1304.669149] ? rcu_softirq_qs+0x20/0x20 [ 1304.669175] avc_has_perm+0x3c9/0x7e0 [ 1304.669202] ? avc_has_perm_noaudit+0x630/0x630 [ 1304.673304] audit: type=1400 audit(1541110135.082:34492): avc: denied { map } for pid=1037 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1304.677308] ? ksys_dup3+0x680/0x680 [ 1304.677327] ? zap_class+0x640/0x640 [ 1304.677344] ? lock_release+0xa00/0xa00 [ 1304.677363] ? perf_trace_sched_process_exec+0x860/0x860 [ 1304.682755] audit: type=1400 audit(1541110135.082:34493): avc: denied { map } for pid=1037 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1304.705015] ? find_held_lock+0x36/0x1c0 [ 1304.705042] sock_has_perm+0x2b1/0x3e0 [ 1304.705061] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 1304.705077] ? fget_raw+0x20/0x20 [ 1304.705090] ? find_held_lock+0x36/0x1c0 [ 1304.705111] ? __f_unlock_pos+0x19/0x20 [ 1304.709211] audit: type=1400 audit(1541110135.082:34494): avc: denied { map } for pid=1037 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1304.712875] selinux_socket_recvmsg+0x36/0x40 [ 1304.712895] security_socket_recvmsg+0x68/0xc0 [ 1304.712917] sock_recvmsg+0x4b/0x110 [ 1304.712935] __sys_recvfrom+0x311/0x5d0 [ 1304.717688] audit: type=1400 audit(1541110135.082:34495): avc: denied { map } for pid=1037 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1304.741979] ? __ia32_sys_send+0x100/0x100 [ 1304.742013] ? wait_for_completion+0x8a0/0x8a0 [ 1304.742034] ? __lock_is_held+0xb5/0x140 [ 1304.742056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1304.742084] ? __sb_end_write+0xd9/0x110 [ 1304.746059] audit: type=1400 audit(1541110135.082:34496): avc: denied { map } for pid=1037 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1304.749505] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1304.749522] ? fput+0x130/0x1a0 [ 1304.749540] ? do_syscall_64+0x9a/0x820 [ 1304.749558] ? do_syscall_64+0x9a/0x820 [ 1304.936162] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1304.940757] ? trace_hardirqs_on+0xbd/0x310 [ 1304.945098] ? __ia32_sys_read+0xb0/0xb0 [ 1304.949173] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1304.954552] ? trace_hardirqs_off_caller+0x310/0x310 [ 1304.959680] __x64_sys_recvfrom+0xe1/0x1a0 [ 1304.963934] do_syscall_64+0x1b9/0x820 [ 1304.967839] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1304.973221] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1304.978179] ? trace_hardirqs_on_caller+0x310/0x310 [ 1304.983237] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1304.988344] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1304.995031] ? __switch_to_asm+0x40/0x70 [ 1304.999102] ? __switch_to_asm+0x34/0x70 [ 1305.003182] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1305.008052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1305.013252] RIP: 0033:0x457569 [ 1305.016471] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:08:55 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x806, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1305.035384] RSP: 002b:00007f2c35776c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 1305.043102] RAX: ffffffffffffffda RBX: 00007f2c35776c90 RCX: 0000000000457569 [ 1305.050382] RDX: fffffffffffffec4 RSI: 0000000020000100 RDI: 0000000000000003 [ 1305.057659] RBP: 000000000072bfa0 R08: 0000000000000000 R09: ffffffffffffffa5 [ 1305.064937] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c357776d4 [ 1305.072212] R13: 00000000004c3449 R14: 00000000004d5230 R15: 0000000000000004 22:08:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x2000000000000000]}, 0x10) 22:08:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:08:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d817, &(0x7f0000000300)) 22:08:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x900, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xe00000000000000]}, 0x10) 22:08:56 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104001, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x20000000]}, 0x10) 22:08:57 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x1400, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1306.606700] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x20000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e51d, &(0x7f0000000300)) 22:08:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x4603, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:08:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x3000000]}, 0x10) 22:08:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xe80, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103712, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x4, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108311, &(0x7f0000000300)) 22:08:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x4603]}, 0x10) [ 1308.491091] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:08:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2d000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:59 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x21, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:08:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10fe0e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:08:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xf401000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:08:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x1e9a]}, 0x10) 22:08:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109e17, &(0x7f0000000300)) 22:09:00 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3a000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1309.743546] kauditd_printk_skb: 143 callbacks suppressed [ 1309.743561] audit: type=1400 audit(1541110140.382:34640): avc: denied { map } for pid=1148 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x7000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1309.899739] audit: type=1400 audit(1541110140.412:34641): avc: denied { map } for pid=1148 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x200003c0]}, 0x10) [ 1309.959841] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1310.001877] audit: type=1400 audit(1541110140.442:34642): avc: denied { map } for pid=1148 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1310.094895] audit: type=1400 audit(1541110140.452:34643): avc: denied { map } for pid=1148 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10721a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x68, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1310.250104] audit: type=1400 audit(1541110140.472:34644): avc: denied { map } for pid=1154 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a615, &(0x7f0000000300)) [ 1310.379786] audit: type=1400 audit(1541110140.492:34645): avc: denied { map } for pid=1154 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:01 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88640000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1310.522776] audit: type=1400 audit(1541110140.492:34646): avc: denied { map } for pid=1154 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1310.656646] audit: type=1400 audit(1541110140.522:34647): avc: denied { map } for pid=1148 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1310.775780] audit: type=1400 audit(1541110140.532:34648): avc: denied { map } for pid=1154 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x6]}, 0x10) [ 1310.949727] audit: type=1400 audit(1541110140.532:34649): avc: denied { map } for pid=1152 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:01 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xfffffffd, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1311.279761] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e11b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xa00, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x4703000000000000]}, 0x10) 22:09:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f113, &(0x7f0000000300)) 22:09:02 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xd00000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x6000000]}, 0x10) 22:09:03 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x86ddffff00000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1312.657894] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10630d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x1000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10fb0b, &(0x7f0000000300)) 22:09:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x2000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:03 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x21000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xa000000]}, 0x10) 22:09:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104b1c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10cd1f, &(0x7f0000000300)) 22:09:04 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88a8ffff, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x3f00]}, 0x10) [ 1314.639093] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xe00, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:05 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x800e000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x500000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1314.902759] kauditd_printk_skb: 154 callbacks suppressed [ 1314.902773] audit: type=1400 audit(1541110145.542:34804): avc: denied { map } for pid=1268 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x600]}, 0x10) 22:09:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101716, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1315.105980] audit: type=1400 audit(1541110145.542:34805): avc: denied { map } for pid=1268 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bd04, &(0x7f0000000300)) [ 1315.235006] audit: type=1400 audit(1541110145.542:34806): avc: denied { map } for pid=1268 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1315.322766] audit: type=1400 audit(1541110145.542:34807): avc: denied { map } for pid=1268 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1315.358922] audit: type=1400 audit(1541110145.582:34808): avc: denied { map } for pid=1268 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1315.468767] audit: type=1400 audit(1541110145.602:34809): avc: denied { map } for pid=1268 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:06 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2900, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1315.606718] audit: type=1400 audit(1541110145.612:34810): avc: denied { map } for pid=1268 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1315.778563] audit: type=1400 audit(1541110145.632:34811): avc: denied { map } for pid=1271 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x1802000000000000]}, 0x10) [ 1315.869292] audit: type=1400 audit(1541110145.662:34812): avc: denied { map } for pid=1271 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1316.008355] audit: type=1400 audit(1541110145.662:34813): avc: denied { map } for pid=1268 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:06 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x700, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xa, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1316.296332] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100007, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6c000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x733a663f00000000]}, 0x10) 22:09:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100015, &(0x7f0000000300)) 22:09:07 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xff5354a7f7000000]}, 0x10) 22:09:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f110, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:08 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffff89, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x3, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1318.011884] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107111, &(0x7f0000000300)) 22:09:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2c000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xe8030000]}, 0x10) 22:09:09 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3f000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102507, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:09 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2b00, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f209, &(0x7f0000000300)) 22:09:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xff0f0000]}, 0x10) [ 1319.495819] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xe00000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xfdffffff, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1319.928504] kauditd_printk_skb: 148 callbacks suppressed [ 1319.928519] audit: type=1400 audit(1541110150.562:34962): avc: denied { map } for pid=1363 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1320.059663] audit: type=1400 audit(1541110150.582:34963): avc: denied { map } for pid=1365 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:10 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3f00, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b917, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1320.211151] audit: type=1400 audit(1541110150.592:34964): avc: denied { map } for pid=1365 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x9a1e]}, 0x10) [ 1320.320724] audit: type=1400 audit(1541110150.602:34965): avc: denied { map } for pid=1363 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1320.460872] audit: type=1400 audit(1541110150.612:34966): avc: denied { map } for pid=1363 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c01a, &(0x7f0000000300)) [ 1320.604981] audit: type=1400 audit(1541110150.612:34967): avc: denied { map } for pid=1365 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1320.700852] audit: type=1400 audit(1541110150.632:34968): avc: denied { map } for pid=1365 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x500000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1320.846053] audit: type=1400 audit(1541110150.672:34969): avc: denied { map } for pid=1365 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1320.987394] audit: type=1400 audit(1541110150.692:34970): avc: denied { map } for pid=1363 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3a00000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x218]}, 0x10) [ 1321.163548] audit: type=1400 audit(1541110150.692:34971): avc: denied { map } for pid=1363 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c606, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1321.711208] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:12 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2b00000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c003, &(0x7f0000000300)) 22:09:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xfffffdfc, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x346]}, 0x10) 22:09:13 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3c00, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x4]}, 0x10) 22:09:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x3000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ba1f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10dc0e, &(0x7f0000000300)) 22:09:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x4002000000000000]}, 0x10) 22:09:13 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2b000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1323.774059] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x8000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:14 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x500000000000000]}, 0x10) 22:09:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108316, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10cb05, &(0x7f0000000300)) 22:09:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x300000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:15 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x6488, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x5000000000000]}, 0x10) [ 1324.980147] kauditd_printk_skb: 144 callbacks suppressed [ 1324.980163] audit: type=1400 audit(1541110155.622:35116): avc: denied { map } for pid=1463 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1325.106549] audit: type=1400 audit(1541110155.622:35117): avc: denied { map } for pid=1463 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1325.279117] audit: type=1400 audit(1541110155.662:35118): avc: denied { map } for pid=1468 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x105e09, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1325.397086] audit: type=1400 audit(1541110155.672:35119): avc: denied { map } for pid=1468 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1325.460499] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bf09, &(0x7f0000000300)) [ 1325.572119] audit: type=1400 audit(1541110155.672:35120): avc: denied { map } for pid=1468 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1325.744289] audit: type=1400 audit(1541110155.672:35121): avc: denied { map } for pid=1468 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:16 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xfeffffff00000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x7400, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x80be000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1325.903848] audit: type=1400 audit(1541110155.682:35122): avc: denied { map } for pid=1463 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x2]}, 0x10) [ 1326.039686] audit: type=1400 audit(1541110155.702:35123): avc: denied { map } for pid=1470 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1326.189661] audit: type=1400 audit(1541110155.712:35124): avc: denied { map } for pid=1470 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1326.289678] audit: type=1400 audit(1541110155.722:35125): avc: denied { map } for pid=1468 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:17 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3c00000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xfffffffe]}, 0x10) 22:09:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103008, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c700, &(0x7f0000000300)) [ 1327.311492] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:18 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3000000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xf8f73f00, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x600000000000000]}, 0x10) 22:09:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x13000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c50b, &(0x7f0000000300)) 22:09:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10001c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:18 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88a8ffff00000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x9a1e0000]}, 0x10) [ 1328.911647] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:19 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8864, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xfdfdffff00000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x1500, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104016, &(0x7f0000000300)) 22:09:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x700000000000000]}, 0x10) 22:09:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100281, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:20 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3c000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1330.125210] kauditd_printk_skb: 150 callbacks suppressed [ 1330.125226] audit: type=1400 audit(1541110160.762:35276): avc: denied { map } for pid=1582 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1330.298816] audit: type=1400 audit(1541110160.802:35277): avc: denied { map } for pid=1582 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x7000000]}, 0x10) [ 1330.434551] audit: type=1400 audit(1541110160.832:35278): avc: denied { map } for pid=1582 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1330.595439] audit: type=1400 audit(1541110160.832:35279): avc: denied { map } for pid=1582 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:21 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x29000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1330.656989] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10dd1d, &(0x7f0000000300)) [ 1330.759868] audit: type=1400 audit(1541110160.902:35280): avc: denied { map } for pid=1582 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x4703000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x3b00000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1330.863688] audit: type=1400 audit(1541110160.902:35281): avc: denied { map } for pid=1585 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1331.048231] audit: type=1400 audit(1541110160.922:35282): avc: denied { map } for pid=1585 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1331.136550] audit: type=1400 audit(1541110160.932:35283): avc: denied { map } for pid=1585 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106d0f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xfeffffff]}, 0x10) [ 1331.289701] audit: type=1400 audit(1541110160.952:35284): avc: denied { map } for pid=1582 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1331.429653] audit: type=1400 audit(1541110160.952:35285): avc: denied { map } for pid=1582 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xf000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108b0a, &(0x7f0000000300)) 22:09:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x1800]}, 0x10) 22:09:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x300, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x700, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a201, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x4c00000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:23 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8906, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x105b17, &(0x7f0000000300)) 22:09:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x4703]}, 0x10) 22:09:24 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8848, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x105701, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x2000000]}, 0x10) 22:09:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x15, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:24 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2c00, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1334.272668] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e40e, &(0x7f0000000300)) 22:09:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x1000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x733a663f]}, 0x10) 22:09:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107e13, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:25 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xfffffffffffff000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1335.446028] kauditd_printk_skb: 165 callbacks suppressed [ 1335.446043] audit: type=1400 audit(1541110166.082:35451): avc: denied { map } for pid=1685 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x1100000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1335.600987] audit: type=1400 audit(1541110166.092:35452): avc: denied { map } for pid=1685 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x18]}, 0x10) [ 1335.734835] audit: type=1400 audit(1541110166.112:35453): avc: denied { map } for pid=1685 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:26 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffa888, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c00d, &(0x7f0000000300)) [ 1335.880435] audit: type=1400 audit(1541110166.132:35454): avc: denied { map } for pid=1685 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1336.022587] audit: type=1400 audit(1541110166.192:35455): avc: denied { map } for pid=1685 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108802, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1336.081596] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1336.169031] audit: type=1400 audit(1541110166.232:35456): avc: denied { map } for pid=1685 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x1000000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1336.356886] audit: type=1400 audit(1541110166.242:35457): avc: denied { map } for pid=1685 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x400000000000000]}, 0x10) [ 1336.495568] audit: type=1400 audit(1541110166.282:35458): avc: denied { map } for pid=1690 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1336.619687] audit: type=1400 audit(1541110166.282:35459): avc: denied { map } for pid=1690 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:27 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x81000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1336.754200] audit: type=1400 audit(1541110166.292:35460): avc: denied { map } for pid=1685 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x3400000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106f0b, &(0x7f0000000300)) 22:09:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x3f00000000000000]}, 0x10) 22:09:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101405, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:28 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88480000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x1f00000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x91ffffff00000000]}, 0x10) 22:09:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10400a, &(0x7f0000000300)) 22:09:28 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2f00, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xc00, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107206, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:29 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffff84, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x100000000000000]}, 0x10) 22:09:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b00e, &(0x7f0000000300)) 22:09:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x240, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:30 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2c00000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x9a1e000000000000]}, 0x10) 22:09:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f41c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:31 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8100000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d619, &(0x7f0000000300)) [ 1340.544176] kauditd_printk_skb: 143 callbacks suppressed [ 1340.544192] audit: type=1400 audit(1541110171.182:35604): avc: denied { map } for pid=1800 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1340.677182] audit: type=1400 audit(1541110171.182:35605): avc: denied { map } for pid=1800 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xa]}, 0x10) [ 1340.784952] audit: type=1400 audit(1541110171.202:35606): avc: denied { map } for pid=1800 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1340.930821] audit: type=1400 audit(1541110171.212:35607): avc: denied { map } for pid=1800 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1341.021465] audit: type=1400 audit(1541110171.272:35608): avc: denied { map } for pid=1800 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1341.071428] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1341.127226] audit: type=1400 audit(1541110171.302:35609): avc: denied { map } for pid=1800 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:31 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8864000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xffffffff00000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x200000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1341.310691] audit: type=1400 audit(1541110171.302:35610): avc: denied { map } for pid=1800 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1341.426015] audit: type=1400 audit(1541110171.362:35611): avc: denied { map } for pid=1800 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109a0b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1341.523630] audit: type=1400 audit(1541110171.372:35612): avc: denied { map } for pid=1800 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x4000000000000000]}, 0x10) [ 1341.677627] audit: type=1400 audit(1541110171.412:35613): avc: denied { map } for pid=1800 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104017, &(0x7f0000000300)) 22:09:32 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8100, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x700]}, 0x10) 22:09:33 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x7, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101b1e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xe803, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1343.219736] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x105701, &(0x7f0000000300)) 22:09:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0xff0f]}, 0x10) 22:09:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xa00000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:34 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x608, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x100000000000000]}, 0x10) 22:09:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10eb0e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8035000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10400c, &(0x7f0000000300)) 22:09:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x20000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x47030000]}, 0x10) 22:09:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2100000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1345.145973] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x10000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c10e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1345.563569] kauditd_printk_skb: 160 callbacks suppressed [ 1345.563585] audit: type=1400 audit(1541110176.202:35774): avc: denied { map } for pid=1899 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1345.725122] audit: type=1400 audit(1541110176.252:35775): avc: denied { map } for pid=1899 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100f17, &(0x7f0000000300)) [ 1345.896289] audit: type=1400 audit(1541110176.292:35776): avc: denied { map } for pid=1903 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:36 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2c000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1346.015148] audit: type=1400 audit(1541110176.302:35777): avc: denied { map } for pid=1903 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x9a1e0000]}, 0x10) 22:09:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x8000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1346.163487] audit: type=1400 audit(1541110176.312:35778): avc: denied { map } for pid=1899 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1346.330791] audit: type=1400 audit(1541110176.312:35779): avc: denied { map } for pid=1903 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1346.489517] audit: type=1400 audit(1541110176.312:35780): avc: denied { map } for pid=1899 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108607, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1346.643008] audit: type=1400 audit(1541110176.332:35781): avc: denied { map } for pid=1903 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1346.719109] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1346.769655] audit: type=1400 audit(1541110176.362:35782): avc: denied { map } for pid=1899 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:37 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xd000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1346.941403] audit: type=1400 audit(1541110176.362:35783): avc: denied { map } for pid=1899 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xfdfdffff, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106e00, &(0x7f0000000300)) 22:09:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x4000]}, 0x10) 22:09:38 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x11000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e201, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x10000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x2]}, 0x10) 22:09:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104f0c, &(0x7f0000000300)) [ 1348.250912] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x80000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:39 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xfeffffff, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x1e9a]}, 0x10) 22:09:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103d08, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:39 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3c, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10551e, &(0x7f0000000300)) 22:09:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x733a663f00000000]}, 0x10) 22:09:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xe8030000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:40 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x14, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1350.213827] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106510, &(0x7f0000000300)) 22:09:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x60000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107e1e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x4603000000000000]}, 0x10) [ 1350.569896] kauditd_printk_skb: 154 callbacks suppressed [ 1350.569912] audit: type=1400 audit(1541110181.182:35938): avc: denied { map } for pid=1994 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1350.719894] audit: type=1400 audit(1541110181.252:35939): avc: denied { map } for pid=2001 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1350.850227] audit: type=1400 audit(1541110181.252:35940): avc: denied { map } for pid=2001 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:41 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x300000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1351.009658] audit: type=1400 audit(1541110181.272:35941): avc: denied { map } for pid=2001 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1351.113577] audit: type=1400 audit(1541110181.282:35942): avc: denied { map } for pid=2001 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x600000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1351.245810] audit: type=1400 audit(1541110181.322:35943): avc: denied { map } for pid=2001 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xe803000000000000]}, 0x10) [ 1351.414793] audit: type=1400 audit(1541110181.322:35944): avc: denied { map } for pid=2001 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107b11, &(0x7f0000000300)) [ 1351.563283] audit: type=1400 audit(1541110181.542:35945): avc: denied { map } for pid=2010 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1351.668241] audit: type=1400 audit(1541110181.542:35946): avc: denied { map } for pid=2010 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1351.779956] audit: type=1400 audit(1541110181.592:35947): avc: denied { map } for pid=2010 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:42 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x89060000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f700, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1352.100861] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xf6ffffff, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:43 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xf0ffff, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xf4010000]}, 0x10) 22:09:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x2, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10210e, &(0x7f0000000300)) 22:09:43 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xf0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x3f00]}, 0x10) 22:09:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108610, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x4603000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:44 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x1100, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1354.068088] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x1802]}, 0x10) 22:09:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x7a00, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107502, &(0x7f0000000300)) 22:09:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x1004b9, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:45 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffca88, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x400000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xfffffffe]}, 0x10) [ 1355.625442] kauditd_printk_skb: 138 callbacks suppressed [ 1355.625458] audit: type=1400 audit(1541110186.262:36086): avc: denied { map } for pid=2097 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b508, &(0x7f0000000300)) [ 1355.801779] audit: type=1400 audit(1541110186.272:36087): avc: denied { map } for pid=2097 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:46 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x700000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1356.006182] audit: type=1400 audit(1541110186.362:36088): avc: denied { map } for pid=2106 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xf401000000000000]}, 0x10) [ 1356.203481] audit: type=1400 audit(1541110186.372:36089): avc: denied { map } for pid=2106 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1356.317862] audit: type=1400 audit(1541110186.402:36090): avc: denied { map } for pid=2106 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e50e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x1f00, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1356.509665] audit: type=1400 audit(1541110186.412:36091): avc: denied { map } for pid=2106 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1356.622899] audit: type=1400 audit(1541110186.502:36092): avc: denied { map } for pid=2106 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1356.751989] audit: type=1400 audit(1541110186.532:36093): avc: denied { map } for pid=2106 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:47 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x1000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1356.883647] audit: type=1400 audit(1541110186.552:36094): avc: denied { map } for pid=2106 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xc003002000000000]}, 0x10) [ 1357.071563] audit: type=1400 audit(1541110186.602:36095): avc: denied { map } for pid=2106 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xf4010000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101b1a, &(0x7f0000000300)) 22:09:48 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x4000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x346]}, 0x10) 22:09:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106510, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1358.061970] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x48, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:49 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8060000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x500000000000000]}, 0x10) 22:09:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10dc19, &(0x7f0000000300)) 22:09:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x80be0000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100002, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:49 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xd00, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1359.161772] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x9a1e000000000000]}, 0x10) 22:09:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xab0d000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:50 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x4888, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ee16, &(0x7f0000000300)) 22:09:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x5, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100f16, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x733a663f]}, 0x10) 22:09:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x543, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1360.653064] kauditd_printk_skb: 144 callbacks suppressed [ 1360.653080] audit: type=1400 audit(1541110191.292:36240): avc: denied { map } for pid=2200 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1360.806506] audit: type=1400 audit(1541110191.292:36241): avc: denied { map } for pid=2200 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1360.960149] audit: type=1400 audit(1541110191.372:36242): avc: denied { map } for pid=2206 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1361.099888] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1361.103547] audit: type=1400 audit(1541110191.372:36243): avc: denied { map } for pid=2206 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xe00]}, 0x10) [ 1361.265897] audit: type=1400 audit(1541110191.442:36244): avc: denied { map } for pid=2206 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101b0d, &(0x7f0000000300)) 22:09:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b705, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x700000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1361.417605] audit: type=1400 audit(1541110191.472:36245): avc: denied { map } for pid=2206 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1361.557651] audit: type=1400 audit(1541110191.512:36246): avc: denied { map } for pid=2206 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:52 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1361.713933] audit: type=1400 audit(1541110191.552:36247): avc: denied { map } for pid=2206 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1361.860895] audit: type=1400 audit(1541110191.572:36248): avc: denied { map } for pid=2206 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1362.026009] audit: type=1400 audit(1541110191.652:36249): avc: denied { map } for pid=2206 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x346, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x18]}, 0x10) 22:09:53 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3f00000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108e0c, &(0x7f0000000300)) 22:09:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106008, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1362.980467] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x200003c0]}, 0x10) 22:09:53 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xfffff000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x22000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:54 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8848000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ed1c, &(0x7f0000000300)) 22:09:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x600000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x218]}, 0x10) 22:09:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10dd03, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:55 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88470000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1364.705946] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x40000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xe8030000]}, 0x10) 22:09:55 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8847000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f715, &(0x7f0000000300)) 22:09:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104113, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x1000000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:56 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x6, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xa000000]}, 0x10) [ 1365.933649] kauditd_printk_skb: 146 callbacks suppressed [ 1365.933665] audit: type=1400 audit(1541110196.572:36396): avc: denied { map } for pid=2311 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1366.099739] audit: type=1400 audit(1541110196.612:36397): avc: denied { map } for pid=2311 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10400f, &(0x7f0000000300)) [ 1366.229710] audit: type=1400 audit(1541110196.612:36398): avc: denied { map } for pid=2311 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1366.364274] audit: type=1400 audit(1541110196.612:36399): avc: denied { map } for pid=2311 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1366.408526] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1366.519768] audit: type=1400 audit(1541110196.642:36400): avc: denied { map } for pid=2311 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:57 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xb00000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x4000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1366.650980] audit: type=1400 audit(1541110196.702:36401): avc: denied { map } for pid=2311 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x7000000]}, 0x10) [ 1366.829751] audit: type=1400 audit(1541110196.702:36402): avc: denied { map } for pid=2311 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1367.006570] audit: type=1400 audit(1541110196.822:36403): avc: denied { map } for pid=2311 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x105508, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1367.151935] audit: type=1400 audit(1541110196.822:36404): avc: denied { map } for pid=2311 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x80350000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1367.309683] audit: type=1400 audit(1541110196.872:36405): avc: denied { map } for pid=2311 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:09:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x700000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:09:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100009, &(0x7f0000000300)) 22:09:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xfeffffff]}, 0x10) 22:09:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1368.316117] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:09:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109e1c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:09:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x200000000000000]}, 0x10) 22:09:59 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x689, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:09:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a20b, &(0x7f0000000300)) 22:09:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x1300000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1369.410093] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xffffffff00000000]}, 0x10) 22:10:00 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x200000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x10000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10fe1e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10671f, &(0x7f0000000300)) 22:10:00 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2f00000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x700000000000000]}, 0x10) 22:10:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x9, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:01 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8906000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x1800000000000000]}, 0x10) [ 1370.980844] kauditd_printk_skb: 153 callbacks suppressed [ 1370.980859] audit: type=1400 audit(1541110201.622:36559): avc: denied { map } for pid=2408 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d905, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1371.157313] audit: type=1400 audit(1541110201.662:36560): avc: denied { map } for pid=2408 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1371.285125] audit: type=1400 audit(1541110201.712:36561): avc: denied { map } for pid=2418 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1371.368400] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1371.392437] audit: type=1400 audit(1541110201.732:36562): avc: denied { map } for pid=2418 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1371.492549] audit: type=1400 audit(1541110201.742:36563): avc: denied { map } for pid=2418 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108002, &(0x7f0000000300)) [ 1371.604933] audit: type=1400 audit(1541110201.752:36564): avc: denied { map } for pid=2418 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2d, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1371.772085] audit: type=1400 audit(1541110201.812:36565): avc: denied { map } for pid=2418 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:02 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x400000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x4000000]}, 0x10) [ 1371.929256] audit: type=1400 audit(1541110201.842:36566): avc: denied { map } for pid=2418 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1372.045958] audit: type=1400 audit(1541110201.852:36567): avc: denied { map } for pid=2418 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1372.210845] audit: type=1400 audit(1541110201.912:36568): avc: denied { map } for pid=2418 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108f04, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:03 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x89ffffff, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1372.520038] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x8, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x20000000]}, 0x10) 22:10:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2c00000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101405, &(0x7f0000000300)) 22:10:03 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xe803]}, 0x10) 22:10:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103e15, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:04 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2100, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xf00000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b01c, &(0x7f0000000300)) 22:10:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x3]}, 0x10) [ 1374.432853] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:05 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x4305000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x3f000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10670a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x3f663a73]}, 0x10) 22:10:06 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109716, &(0x7f0000000300)) 22:10:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xb000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1375.995016] kauditd_printk_skb: 141 callbacks suppressed [ 1375.995033] audit: type=1400 audit(1541110206.632:36710): avc: denied { map } for pid=2527 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x18020000]}, 0x10) 22:10:06 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1376.134708] audit: type=1400 audit(1541110206.722:36711): avc: denied { map } for pid=2527 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106404, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1376.250261] audit: type=1400 audit(1541110206.752:36712): avc: denied { map } for pid=2527 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1376.336035] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1376.387119] audit: type=1400 audit(1541110206.842:36713): avc: denied { map } for pid=2527 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x4800000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x800000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1376.524333] audit: type=1400 audit(1541110206.842:36714): avc: denied { map } for pid=2527 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1376.659099] audit: type=1400 audit(1541110206.882:36715): avc: denied { map } for pid=2538 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1376.815177] audit: type=1400 audit(1541110206.882:36716): avc: denied { map } for pid=2538 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104010, &(0x7f0000000300)) [ 1376.979694] audit: type=1400 audit(1541110206.922:36717): avc: denied { map } for pid=2538 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x700]}, 0x10) [ 1377.131015] audit: type=1400 audit(1541110206.922:36718): avc: denied { map } for pid=2539 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:07 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x1400000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1377.269659] audit: type=1400 audit(1541110206.932:36719): avc: denied { map } for pid=2538 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e011, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xa]}, 0x10) 22:10:08 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x84ffffff, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x6000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bc18, &(0x7f0000000300)) [ 1378.134662] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xf8f73f0000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:09 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3580, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100c18, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x400000000000000]}, 0x10) 22:10:09 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2900000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10cb1d, &(0x7f0000000300)) 22:10:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x18000000]}, 0x10) 22:10:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x900, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103e0a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:10 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x20000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1380.043835] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x8cffffff, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xa00]}, 0x10) 22:10:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108b16, &(0x7f0000000300)) 22:10:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x14000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1381.019400] kauditd_printk_skb: 148 callbacks suppressed [ 1381.019416] audit: type=1400 audit(1541110211.652:36868): avc: denied { map } for pid=2645 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x1100, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1381.168209] audit: type=1400 audit(1541110211.702:36869): avc: denied { map } for pid=2645 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d910, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1381.319651] audit: type=1400 audit(1541110211.722:36870): avc: denied { map } for pid=2645 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x5]}, 0x10) [ 1381.425112] audit: type=1400 audit(1541110211.732:36871): avc: denied { map } for pid=2645 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1381.578727] audit: type=1400 audit(1541110211.802:36872): avc: denied { map } for pid=2645 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1381.690151] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1381.730734] audit: type=1400 audit(1541110211.862:36873): avc: denied { map } for pid=2645 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:12 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2000000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1381.836897] audit: type=1400 audit(1541110211.872:36874): avc: denied { map } for pid=2645 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f81a, &(0x7f0000000300)) 22:10:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6b6b6b00000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1381.978563] audit: type=1400 audit(1541110211.932:36875): avc: denied { map } for pid=2645 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1382.098402] audit: type=1400 audit(1541110211.942:36876): avc: denied { map } for pid=2651 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1382.223795] audit: type=1400 audit(1541110211.952:36877): avc: denied { map } for pid=2645 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xe, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x4000000000000000]}, 0x10) 22:10:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106d1d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:13 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x89ffffff00000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104004, &(0x7f0000000300)) 22:10:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x40020000]}, 0x10) 22:10:14 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x800e0000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1383.504732] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x9000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104103, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x80100200, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10fe08, &(0x7f0000000300)) 22:10:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xfeffffff00000000]}, 0x10) 22:10:14 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2f000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:15 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8035, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x91ffffff]}, 0x10) 22:10:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d50d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x1f000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109c0b, &(0x7f0000000300)) 22:10:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x3000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:16 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x800e, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x3000000]}, 0x10) [ 1386.296273] kauditd_printk_skb: 144 callbacks suppressed [ 1386.296289] audit: type=1400 audit(1541110216.932:37022): avc: denied { map } for pid=2751 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:17 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x30, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1386.457626] audit: type=1400 audit(1541110216.942:37023): avc: denied { map } for pid=2752 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108213, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xc0030020]}, 0x10) [ 1386.586100] audit: type=1400 audit(1541110216.952:37024): avc: denied { map } for pid=2752 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1386.698135] audit: type=1400 audit(1541110216.962:37025): avc: denied { map } for pid=2752 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1386.847835] audit: type=1400 audit(1541110216.972:37026): avc: denied { map } for pid=2751 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1386.890178] kworker/dying (21) used greatest stack depth: 13480 bytes left 22:10:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f110, &(0x7f0000000300)) 22:10:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x7a, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1387.007960] audit: type=1400 audit(1541110217.002:37027): avc: denied { map } for pid=2751 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x600, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1387.129708] audit: type=1400 audit(1541110217.022:37028): avc: denied { map } for pid=2751 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:17 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xb, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1387.239257] audit: type=1400 audit(1541110217.032:37029): avc: denied { map } for pid=2752 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1387.419653] audit: type=1400 audit(1541110217.032:37030): avc: denied { map } for pid=2754 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1387.550886] audit: type=1400 audit(1541110217.032:37031): avc: denied { map } for pid=2754 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x1f4]}, 0x10) 22:10:18 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88ffffff00000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108f0e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108607, &(0x7f0000000300)) [ 1388.260835] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1388.467098] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xffffff91]}, 0x10) 22:10:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x300000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:19 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xb000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x4, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b909, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x500]}, 0x10) 22:10:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10af17, &(0x7f0000000300)) 22:10:20 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xfdffffff, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1389.872273] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2200000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x46030000]}, 0x10) 22:10:20 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x806000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100006, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x300000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c209, &(0x7f0000000300)) 22:10:21 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x30000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x4703]}, 0x10) [ 1391.358804] kauditd_printk_skb: 154 callbacks suppressed [ 1391.358818] audit: type=1400 audit(1541110221.992:37186): avc: denied { map } for pid=2859 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104012, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1391.500431] audit: type=1400 audit(1541110222.012:37187): avc: denied { map } for pid=2859 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2b, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1391.575866] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1391.625631] audit: type=1400 audit(1541110222.022:37188): avc: denied { map } for pid=2859 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x4002]}, 0x10) [ 1391.757273] audit: type=1400 audit(1541110222.032:37189): avc: denied { map } for pid=2859 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x4000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x3f00000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e900, &(0x7f0000000300)) [ 1391.980578] audit: type=1400 audit(1541110222.072:37190): avc: denied { map } for pid=2859 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1392.080813] audit: type=1400 audit(1541110222.112:37191): avc: denied { map } for pid=2865 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1392.189651] audit: type=1400 audit(1541110222.122:37192): avc: denied { map } for pid=2864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xf0ffffffffffff, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1392.307752] audit: type=1400 audit(1541110222.122:37193): avc: denied { map } for pid=2865 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1392.449655] audit: type=1400 audit(1541110222.122:37194): avc: denied { map } for pid=2859 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1392.589404] audit: type=1400 audit(1541110222.132:37195): avc: denied { map } for pid=2864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x2000]}, 0x10) 22:10:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101b10, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:23 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x1100000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102407, &(0x7f0000000300)) 22:10:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x11000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xff0f]}, 0x10) [ 1393.619460] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:24 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x84ffffff00000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x7000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x105f03, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f504, &(0x7f0000000300)) 22:10:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x3f00000000000000]}, 0x10) 22:10:25 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xfdffffff00000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x9000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e81a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x1802000000000000]}, 0x10) 22:10:26 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xb00, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10801d, &(0x7f0000000300)) [ 1395.709722] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x22, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:26 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffff88, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x600000000000000]}, 0x10) [ 1396.371300] kauditd_printk_skb: 157 callbacks suppressed [ 1396.371315] audit: type=1400 audit(1541110227.012:37353): avc: denied { map } for pid=2965 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1396.530523] audit: type=1400 audit(1541110227.042:37354): avc: denied { map } for pid=2965 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109f1b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1396.660607] audit: type=1400 audit(1541110227.092:37355): avc: denied { map } for pid=2965 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x6, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1396.777585] audit: type=1400 audit(1541110227.142:37356): avc: denied { map } for pid=2965 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1396.929254] audit: type=1400 audit(1541110227.142:37357): avc: denied { map } for pid=2965 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:27 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffdd86, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1397.016632] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10871f, &(0x7f0000000300)) [ 1397.098636] audit: type=1400 audit(1541110227.202:37358): avc: denied { map } for pid=2965 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1397.211748] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1397.254682] audit: type=1400 audit(1541110227.202:37359): avc: denied { map } for pid=2965 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x3b, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xff0f0000]}, 0x10) [ 1397.404697] audit: type=1400 audit(1541110227.232:37360): avc: denied { map } for pid=2968 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1397.537228] audit: type=1400 audit(1541110227.232:37361): avc: denied { map } for pid=2968 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1397.675020] audit: type=1400 audit(1541110227.242:37362): avc: denied { map } for pid=2965 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:28 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x29, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101d00, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10000f, &(0x7f0000000300)) 22:10:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x1800]}, 0x10) 22:10:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xd, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1398.499934] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:29 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x800000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x240]}, 0x10) 22:10:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e51d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10331d, &(0x7f0000000300)) 22:10:30 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3a00, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x5000000000000]}, 0x10) 22:10:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x11, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:30 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x4305, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108511, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108108, &(0x7f0000000300)) 22:10:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x6000000]}, 0x10) 22:10:31 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8847, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1401.452608] kauditd_printk_skb: 152 callbacks suppressed [ 1401.452624] audit: type=1400 audit(1541110232.082:37515): avc: denied { map } for pid=3078 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1401.510149] audit: type=1400 audit(1541110232.122:37516): avc: denied { map } for pid=3078 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1401.541511] audit: type=1400 audit(1541110232.162:37517): avc: denied { map } for pid=3078 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1401.570647] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:32 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x11, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1401.690290] audit: type=1400 audit(1541110232.202:37518): avc: denied { map } for pid=3078 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101706, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a301, &(0x7f0000000300)) [ 1401.751408] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1401.819950] audit: type=1400 audit(1541110232.252:37519): avc: denied { map } for pid=3078 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xe803000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6c00, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1401.939690] audit: type=1400 audit(1541110232.292:37520): avc: denied { map } for pid=3078 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1402.034052] audit: type=1400 audit(1541110232.302:37521): avc: denied { map } for pid=3078 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x2000000000000000]}, 0x10) [ 1402.139650] audit: type=1400 audit(1541110232.332:37522): avc: denied { map } for pid=3087 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1402.209704] audit: type=1400 audit(1541110232.332:37523): avc: denied { map } for pid=3087 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:32 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xfffffffe, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1402.321607] audit: type=1400 audit(1541110232.372:37524): avc: denied { map } for pid=3078 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x300000000000000]}, 0x10) 22:10:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d01a, &(0x7f0000000300)) 22:10:33 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2f, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108018, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x300000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1403.590008] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xff0f000000000000]}, 0x10) 22:10:34 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x100000000000000, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x4800, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ee10, &(0x7f0000000300)) 22:10:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88caffff, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xc000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f509, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x4703000000000000]}, 0x10) 22:10:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8100000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1405.216530] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x1000000]}, 0x10) 22:10:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10541b, &(0x7f0000000300)) 22:10:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xf83f0000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x15000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:36 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88a8ffff, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100c0b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xf7a75453ff]}, 0x10) 22:10:37 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8864, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1406.575851] kauditd_printk_skb: 144 callbacks suppressed [ 1406.575866] audit: type=1400 audit(1541110237.212:37669): avc: denied { map } for pid=3188 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109e0a, &(0x7f0000000300)) [ 1406.712041] audit: type=1400 audit(1541110237.222:37670): avc: denied { map } for pid=3188 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1406.851915] audit: type=1400 audit(1541110237.242:37671): avc: denied { map } for pid=3188 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1406.947392] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1407.005942] audit: type=1400 audit(1541110237.252:37672): avc: denied { map } for pid=3188 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x4002000000000000]}, 0x10) 22:10:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106a07, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x4000000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1407.150652] audit: type=1400 audit(1541110237.282:37673): avc: denied { map } for pid=3188 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1407.308031] audit: type=1400 audit(1541110237.342:37674): avc: denied { map } for pid=3192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:38 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x11000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1407.439658] audit: type=1400 audit(1541110237.362:37675): avc: denied { map } for pid=3188 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x1300, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1407.579769] audit: type=1400 audit(1541110237.362:37676): avc: denied { map } for pid=3188 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1407.720053] audit: type=1400 audit(1541110237.382:37677): avc: denied { map } for pid=3192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1407.852932] audit: type=1400 audit(1541110237.382:37678): avc: denied { map } for pid=3192 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xa00000000000000]}, 0x10) 22:10:38 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8847, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c00e, &(0x7f0000000300)) 22:10:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b217, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1408.520853] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:39 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xffffff89, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2200, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xe000000]}, 0x10) 22:10:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f31a, &(0x7f0000000300)) 22:10:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x10, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:40 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x608, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f91b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x5000000]}, 0x10) 22:10:41 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x30000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109319, &(0x7f0000000300)) [ 1410.643888] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x347]}, 0x10) 22:10:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xfdffffff00000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xc, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:41 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10001b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xff5354a7f7000000]}, 0x10) 22:10:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10800a, &(0x7f0000000300)) [ 1411.668317] kauditd_printk_skb: 155 callbacks suppressed [ 1411.668332] audit: type=1400 audit(1541110242.302:37834): avc: denied { map } for pid=3299 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1411.679627] audit: type=1400 audit(1541110242.312:37835): avc: denied { map } for pid=3299 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:42 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x700, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1411.899667] audit: type=1400 audit(1541110242.312:37836): avc: denied { map } for pid=3299 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1412.047022] audit: type=1400 audit(1541110242.382:37837): avc: denied { map } for pid=3299 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1412.209708] audit: type=1400 audit(1541110242.412:37838): avc: denied { map } for pid=3299 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xd000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1412.319702] audit: type=1400 audit(1541110242.462:37839): avc: denied { map } for pid=3299 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1412.339869] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1412.432217] audit: type=1400 audit(1541110242.472:37840): avc: denied { map } for pid=3299 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xe00000000000000]}, 0x10) 22:10:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x100000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1412.609660] audit: type=1400 audit(1541110242.542:37841): avc: denied { map } for pid=3299 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10001a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1412.725747] audit: type=1400 audit(1541110242.542:37842): avc: denied { map } for pid=3308 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:43 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2b00, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1412.859962] audit: type=1400 audit(1541110242.552:37843): avc: denied { map } for pid=3299 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bc0e, &(0x7f0000000300)) 22:10:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x3f000000]}, 0x10) 22:10:44 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfdffffff00000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10671f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xb, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1414.063944] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x40000000]}, 0x10) 22:10:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e50e, &(0x7f0000000300)) 22:10:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x4c000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:45 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2f00000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e61b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:45 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3c00000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x7]}, 0x10) 22:10:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108006, &(0x7f0000000300)) 22:10:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xb00, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:46 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x800e0000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ba07, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1416.114493] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x3e8]}, 0x10) 22:10:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x68000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a819, &(0x7f0000000300)) 22:10:47 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8035, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1416.674804] kauditd_printk_skb: 153 callbacks suppressed [ 1416.674819] audit: type=1400 audit(1541110247.312:37997): avc: denied { map } for pid=3411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1416.806571] audit: type=1400 audit(1541110247.322:37998): avc: denied { map } for pid=3403 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1416.959673] audit: type=1400 audit(1541110247.322:37999): avc: denied { map } for pid=3403 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x6]}, 0x10) [ 1417.108899] audit: type=1400 audit(1541110247.372:38000): avc: denied { map } for pid=3411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1417.208297] audit: type=1400 audit(1541110247.372:38001): avc: denied { map } for pid=3411 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x500, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1417.408159] audit: type=1400 audit(1541110247.412:38002): avc: denied { map } for pid=3411 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:48 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x689, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1417.563350] audit: type=1400 audit(1541110247.472:38003): avc: denied { map } for pid=3411 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10711c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1417.694285] audit: type=1400 audit(1541110247.502:38004): avc: denied { map } for pid=3411 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1417.825892] audit: type=1400 audit(1541110247.542:38005): avc: denied { map } for pid=3411 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xf401]}, 0x10) 22:10:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xab0d0000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1417.963093] audit: type=1400 audit(1541110247.542:38006): avc: denied { map } for pid=3411 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10000d, &(0x7f0000000300)) 22:10:48 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x11, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x9a1e]}, 0x10) 22:10:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109318, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:49 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x600000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x1f4, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x4603]}, 0x10) 22:10:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109f16, &(0x7f0000000300)) [ 1419.689421] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xab0d, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:50 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88caffff00000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104d01, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x4]}, 0x10) 22:10:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x43050000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10da02, &(0x7f0000000300)) 22:10:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x80410000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x91ffffff00000000]}, 0x10) 22:10:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a616, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:52 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xd00, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1421.369690] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xfffffff6, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1421.910054] kauditd_printk_skb: 145 callbacks suppressed [ 1421.910070] audit: type=1400 audit(1541110252.552:38152): avc: denied { map } for pid=3511 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1422.062230] audit: type=1400 audit(1541110252.552:38153): avc: denied { map } for pid=3511 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10500c, &(0x7f0000000300)) [ 1422.200300] audit: type=1400 audit(1541110252.552:38154): avc: denied { map } for pid=3511 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x600]}, 0x10) 22:10:52 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2100, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1422.357857] audit: type=1400 audit(1541110252.552:38155): avc: denied { map } for pid=3511 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1422.501155] audit: type=1400 audit(1541110252.562:38156): avc: denied { map } for pid=3510 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x47030000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1422.649794] audit: type=1400 audit(1541110252.562:38157): avc: denied { map } for pid=3510 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10681d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1422.789720] audit: type=1400 audit(1541110252.562:38158): avc: denied { map } for pid=3510 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1422.882611] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1422.920883] audit: type=1400 audit(1541110252.562:38159): avc: denied { map } for pid=3510 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1423.019654] audit: type=1400 audit(1541110252.602:38160): avc: denied { map } for pid=3511 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x3ff800, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1423.169712] audit: type=1400 audit(1541110252.622:38161): avc: denied { map } for pid=3510 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:54 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfffffffe, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109f14, &(0x7f0000000300)) 22:10:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x300]}, 0x10) 22:10:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100014, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:55 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xa00000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0xe]}, 0x10) [ 1424.622498] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xfcfdffff, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102517, &(0x7f0000000300)) 22:10:55 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2c00000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100019, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x2000000]}, 0x10) 22:10:56 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10001b, &(0x7f0000000300)) 22:10:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xf000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:10:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x50000]}, 0x10) 22:10:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f504, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1426.581823] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x300, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:57 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfffffffd, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1426.921624] kauditd_printk_skb: 158 callbacks suppressed [ 1426.921640] audit: type=1400 audit(1541110257.562:38320): avc: denied { map } for pid=3603 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1427.103955] audit: type=1400 audit(1541110257.632:38321): avc: denied { map } for pid=3603 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x1800000000000000]}, 0x10) 22:10:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10021d, &(0x7f0000000300)) [ 1427.273367] audit: type=1400 audit(1541110257.642:38322): avc: denied { map } for pid=3603 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1427.414698] audit: type=1400 audit(1541110257.682:38323): avc: denied { map } for pid=3603 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1427.574316] audit: type=1400 audit(1541110257.692:38324): avc: denied { map } for pid=3603 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2f, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1427.722913] audit: type=1400 audit(1541110257.762:38325): avc: denied { map } for pid=3603 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x1000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1427.864323] audit: type=1400 audit(1541110257.772:38326): avc: denied { map } for pid=3614 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1428.030196] audit: type=1400 audit(1541110257.772:38327): avc: denied { map } for pid=3603 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109e17, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1428.119750] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:10:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x6000000]}, 0x10) [ 1428.169712] audit: type=1400 audit(1541110257.782:38328): avc: denied { map } for pid=3615 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1428.289676] audit: type=1400 audit(1541110257.782:38329): avc: denied { map } for pid=3614 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:10:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x7a000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:10:59 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3a00000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:10:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c002, &(0x7f0000000300)) 22:10:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xa00]}, 0x10) 22:10:59 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x89060000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10920d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xa000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103401, &(0x7f0000000300)) [ 1429.898763] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:00 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x20000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x600]}, 0x10) 22:11:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xa00, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c312, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:01 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88640000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106205, &(0x7f0000000300)) 22:11:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x9a1e000000000000]}, 0x10) 22:11:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x3f00, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:02 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x84ffffff, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1431.561046] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108318, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xf401000000000000]}, 0x10) 22:11:02 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2f000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1431.931623] kauditd_printk_skb: 155 callbacks suppressed [ 1431.931638] audit: type=1400 audit(1541110262.572:38485): avc: denied { map } for pid=3711 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1432.099770] audit: type=1400 audit(1541110262.642:38486): avc: denied { map } for pid=3711 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1432.199813] audit: type=1400 audit(1541110262.652:38487): avc: denied { map } for pid=3711 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b11c, &(0x7f0000000300)) [ 1432.364706] audit: type=1400 audit(1541110262.702:38488): avc: denied { map } for pid=3711 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1432.497043] audit: type=1400 audit(1541110262.742:38489): avc: denied { map } for pid=3711 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:03 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2c000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x700]}, 0x10) [ 1432.653205] audit: type=1400 audit(1541110262.802:38490): avc: denied { map } for pid=3711 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1432.820710] audit: type=1400 audit(1541110262.802:38491): avc: denied { map } for pid=3711 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1432.823838] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x347, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1432.999428] audit: type=1400 audit(1541110262.802:38492): avc: denied { map } for pid=3717 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100011, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1433.100008] audit: type=1400 audit(1541110262.812:38493): avc: denied { map } for pid=3717 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1433.217682] audit: type=1400 audit(1541110262.822:38494): avc: denied { map } for pid=3717 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:03 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2c, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x97ffffff, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xe803]}, 0x10) 22:11:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108d05, &(0x7f0000000300)) 22:11:04 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x105d1f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x7]}, 0x10) 22:11:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x21080, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:05 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2900000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109301, &(0x7f0000000300)) [ 1434.847682] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x40000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x91ffffff00000000]}, 0x10) 22:11:06 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3c000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10551d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10400e, &(0x7f0000000300)) 22:11:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x500]}, 0x10) 22:11:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x200000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:07 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1436.465587] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2c00, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xfeffffff00000000]}, 0x10) 22:11:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106c09, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1437.177177] kauditd_printk_skb: 151 callbacks suppressed [ 1437.177192] audit: type=1400 audit(1541110267.812:38646): avc: denied { map } for pid=3819 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:07 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xb00, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104218, &(0x7f0000000300)) [ 1437.351900] audit: type=1400 audit(1541110267.822:38647): avc: denied { map } for pid=3819 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1437.456314] audit: type=1400 audit(1541110267.822:38648): avc: denied { map } for pid=3819 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1437.569048] audit: type=1400 audit(1541110267.862:38649): avc: denied { map } for pid=3819 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1437.710000] audit: type=1400 audit(1541110267.912:38650): avc: denied { map } for pid=3819 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xe00000000000000]}, 0x10) [ 1437.839452] audit: type=1400 audit(1541110267.912:38651): avc: denied { map } for pid=3819 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x4703, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1437.991100] audit: type=1400 audit(1541110267.972:38652): avc: denied { map } for pid=3819 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1438.135588] audit: type=1400 audit(1541110267.992:38653): avc: denied { map } for pid=3819 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:08 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1100, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106808, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1438.335596] audit: type=1400 audit(1541110267.992:38654): avc: denied { map } for pid=3819 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1438.422037] audit: type=1400 audit(1541110268.092:38655): avc: denied { map } for pid=3819 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x1802000000000000]}, 0x10) 22:11:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106101, &(0x7f0000000300)) 22:11:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xffffff8c, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:09 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xffffff88, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x300000000000000]}, 0x10) 22:11:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104009, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:10 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xffffa888, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x4002, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100180, &(0x7f0000000300)) 22:11:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x4002]}, 0x10) [ 1440.261328] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xfffffff5, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfffffffffffff000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106408, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xf7a75453ff]}, 0x10) 22:11:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109a0b, &(0x7f0000000300)) 22:11:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xd00, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x3e8]}, 0x10) 22:11:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bc04, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:12 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2b, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1442.207757] kauditd_printk_skb: 144 callbacks suppressed [ 1442.207773] audit: type=1400 audit(1541110272.842:38800): avc: denied { map } for pid=3925 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106808, &(0x7f0000000300)) [ 1442.362384] audit: type=1400 audit(1541110272.892:38801): avc: denied { map } for pid=3927 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x9a1e0000]}, 0x10) 22:11:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x9, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1442.489776] audit: type=1400 audit(1541110272.892:38802): avc: denied { map } for pid=3927 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1442.619887] audit: type=1400 audit(1541110272.892:38803): avc: denied { map } for pid=3927 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:13 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3a, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1442.766511] audit: type=1400 audit(1541110272.902:38804): avc: denied { map } for pid=3925 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xf401, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1442.892995] audit: type=1400 audit(1541110272.902:38805): avc: denied { map } for pid=3928 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1443.018209] audit: type=1400 audit(1541110272.902:38806): avc: denied { map } for pid=3925 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109e0b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1443.199657] audit: type=1400 audit(1541110272.902:38807): avc: denied { map } for pid=3925 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1443.269858] audit: type=1400 audit(1541110272.902:38808): avc: denied { map } for pid=3928 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1443.377481] audit: type=1400 audit(1541110272.902:38809): avc: denied { map } for pid=3928 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xf401]}, 0x10) 22:11:14 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c606, &(0x7f0000000300)) [ 1443.702483] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 1443.902483] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x10, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x9a1e]}, 0x10) 22:11:15 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108416, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x34000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:15 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4788, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106702, &(0x7f0000000300)) [ 1445.092021] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xe00]}, 0x10) [ 1445.245528] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6c00000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f513, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:16 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x600, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x4002000000000000]}, 0x10) 22:11:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c408, &(0x7f0000000300)) 22:11:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x5000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:17 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xffffff84, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1446.739736] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108e01, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xa000000]}, 0x10) 22:11:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x60, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1447.209772] kauditd_printk_skb: 157 callbacks suppressed [ 1447.209788] audit: type=1400 audit(1541110277.842:38967): avc: denied { map } for pid=4025 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1447.354784] audit: type=1400 audit(1541110277.852:38968): avc: denied { map } for pid=4025 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:18 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1447.549652] audit: type=1400 audit(1541110277.882:38969): avc: denied { map } for pid=4025 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1447.689658] audit: type=1400 audit(1541110277.932:38970): avc: denied { map } for pid=4025 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x3f00000000000000]}, 0x10) 22:11:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10930b, &(0x7f0000000300)) [ 1447.827663] audit: type=1400 audit(1541110277.952:38971): avc: denied { map } for pid=4025 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x1200, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1447.936778] audit: type=1400 audit(1541110278.022:38972): avc: denied { map } for pid=4025 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1448.074804] audit: type=1400 audit(1541110278.032:38973): avc: denied { map } for pid=4025 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1448.107175] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:18 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x806000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1448.202417] audit: type=1400 audit(1541110278.052:38974): avc: denied { map } for pid=4032 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1448.343395] audit: type=1400 audit(1541110278.072:38975): avc: denied { map } for pid=4032 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xdab, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106b1b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1448.461779] audit: type=1400 audit(1541110278.092:38976): avc: denied { map } for pid=4032 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x3f000000]}, 0x10) 22:11:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10861a, &(0x7f0000000300)) 22:11:19 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88caffff, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x2000000]}, 0x10) 22:11:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x12, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10000c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104b1c, &(0x7f0000000300)) [ 1449.932115] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:20 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xb, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x2d00, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xf4010000]}, 0x10) 22:11:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x4603]}, 0x10) 22:11:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d21f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:21 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xd, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a014, &(0x7f0000000300)) 22:11:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x3f00000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xe80, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x1e9a]}, 0x10) 22:11:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ba1f, &(0x7f0000000300)) 22:11:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xb00000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1451.997952] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1452.232520] kauditd_printk_skb: 145 callbacks suppressed [ 1452.232537] audit: type=1400 audit(1541110282.872:39122): avc: denied { map } for pid=4130 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a41b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1452.399655] audit: type=1400 audit(1541110282.942:39123): avc: denied { map } for pid=4130 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xff5354a7f7000000]}, 0x10) [ 1452.513789] audit: type=1400 audit(1541110282.952:39124): avc: denied { map } for pid=4130 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1452.641282] audit: type=1400 audit(1541110283.022:39125): avc: denied { map } for pid=4130 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1452.779471] audit: type=1400 audit(1541110283.022:39126): avc: denied { map } for pid=4130 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:23 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1400, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x8041000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1452.982165] audit: type=1400 audit(1541110283.202:39127): avc: denied { map } for pid=4141 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1453.139051] audit: type=1400 audit(1541110283.202:39128): avc: denied { map } for pid=4141 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103712, &(0x7f0000000300)) [ 1453.286399] audit: type=1400 audit(1541110283.212:39129): avc: denied { map } for pid=4142 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x5]}, 0x10) [ 1453.437001] audit: type=1400 audit(1541110283.212:39130): avc: denied { map } for pid=4142 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107914, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1453.569287] audit: type=1400 audit(1541110283.222:39131): avc: denied { map } for pid=4141 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:24 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4305, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x8cffffff00000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x4703000000000000]}, 0x10) 22:11:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108f0e, &(0x7f0000000300)) 22:11:25 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xffffdd86, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x1200000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b40f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x2000000000000000]}, 0x10) [ 1455.321524] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:26 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x7, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xf5ffffff00000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100002, &(0x7f0000000300)) 22:11:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x5000000000000]}, 0x10) 22:11:26 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x700000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xd00000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10760e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x7000000]}, 0x10) 22:11:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e806, &(0x7f0000000300)) 22:11:27 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8848, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1457.245620] kauditd_printk_skb: 155 callbacks suppressed [ 1457.245637] audit: type=1400 audit(1541110287.882:39287): avc: denied { map } for pid=4230 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1457.474666] audit: type=1400 audit(1541110287.972:39288): avc: denied { map } for pid=4230 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1457.539907] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x4000]}, 0x10) [ 1457.612175] audit: type=1400 audit(1541110287.972:39289): avc: denied { map } for pid=4230 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1457.710205] audit: type=1400 audit(1541110288.082:39290): avc: denied { map } for pid=4230 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x6800000000000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1457.855276] audit: type=1400 audit(1541110288.082:39291): avc: denied { map } for pid=4230 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10701d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:28 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3c, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1458.021749] audit: type=1400 audit(1541110288.152:39292): avc: denied { map } for pid=4238 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x12000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1458.089654] audit: type=1400 audit(1541110288.202:39293): avc: denied { map } for pid=4238 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1458.249678] audit: type=1400 audit(1541110288.212:39294): avc: denied { map } for pid=4238 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1458.380093] audit: type=1400 audit(1541110288.212:39295): avc: denied { map } for pid=4238 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x105e1b, &(0x7f0000000300)) 22:11:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x3f663a73]}, 0x10) [ 1458.479656] audit: type=1400 audit(1541110288.282:39296): avc: denied { map } for pid=4238 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:29 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x84ffffff00000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bb0f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x74000000, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x1f4]}, 0x10) 22:11:30 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8848000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x46030000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108014, &(0x7f0000000300)) 22:11:30 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfffff000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x6]}, 0x10) 22:11:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10151e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:31 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xd000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1461.088888] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 22:11:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x3f000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x2]}, 0x10) 22:11:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0xf83f00, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c01e, &(0x7f0000000300)) 22:11:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x200000000000000]}, 0x10) 22:11:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d817, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:32 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x6488, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1462.257275] kauditd_printk_skb: 153 callbacks suppressed [ 1462.257292] audit: type=1400 audit(1541110292.892:39450): avc: denied { map } for pid=4330 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1462.408387] audit: type=1400 audit(1541110292.892:39451): avc: denied { map } for pid=4330 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1462.547734] audit: type=1400 audit(1541110292.942:39452): avc: denied { map } for pid=4330 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f21b, &(0x7f0000000300)) [ 1462.710789] audit: type=1400 audit(1541110292.942:39453): avc: denied { map } for pid=4330 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:33 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x543, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1462.809975] audit: type=1400 audit(1541110293.042:39454): avc: denied { map } for pid=4330 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xffffffff00000000]}, 0x10) 22:11:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x300, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1462.972033] audit: type=1400 audit(1541110293.042:39455): avc: denied { map } for pid=4330 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1463.185393] audit: type=1400 audit(1541110293.252:39456): avc: denied { map } for pid=4338 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10800e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1463.296404] audit: type=1400 audit(1541110293.272:39457): avc: denied { map } for pid=4338 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f207, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1463.440615] audit: type=1400 audit(1541110293.282:39458): avc: denied { map } for pid=4338 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:34 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88a8ffff00000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1463.597964] audit: type=1400 audit(1541110293.302:39459): avc: denied { map } for pid=4338 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x4000000]}, 0x10) 22:11:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103d05, &(0x7f0000000300)) 22:11:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xf0ffffffffffff, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c003, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x80000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xfffffffe]}, 0x10) 22:11:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10fb0b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xd00000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x218]}, 0x10) 22:11:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104009, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106405, &(0x7f0000000300)) 22:11:36 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x1500000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x47030000]}, 0x10) 22:11:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bd06, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:37 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xffffca88, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100005, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102719, &(0x7f0000000300)) 22:11:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xff0f]}, 0x10) [ 1467.276235] kauditd_printk_skb: 150 callbacks suppressed [ 1467.276250] audit: type=1400 audit(1541110297.912:39610): avc: denied { map } for pid=4436 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1467.432893] audit: type=1400 audit(1541110297.922:39611): avc: denied { map } for pid=4430 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:38 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4305000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1467.564677] audit: type=1400 audit(1541110297.922:39612): avc: denied { map } for pid=4430 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101b04, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x8010020000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1467.759347] audit: type=1400 audit(1541110297.952:39613): avc: denied { map } for pid=4436 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1467.859065] audit: type=1400 audit(1541110298.002:39614): avc: denied { map } for pid=4436 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1468.012537] audit: type=1400 audit(1541110298.042:39615): avc: denied { map } for pid=4436 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10800a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x1802]}, 0x10) [ 1468.119422] audit: type=1400 audit(1541110298.052:39616): avc: denied { map } for pid=4436 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ae13, &(0x7f0000000300)) [ 1468.268510] audit: type=1400 audit(1541110298.122:39617): avc: denied { map } for pid=4436 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1468.419079] audit: type=1400 audit(1541110298.132:39618): avc: denied { map } for pid=4436 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:39 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3f00000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1468.589668] audit: type=1400 audit(1541110298.202:39619): avc: denied { map } for pid=4436 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x3f00]}, 0x10) 22:11:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10071a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10971d, &(0x7f0000000300)) 22:11:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104016, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:40 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x400000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x40000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x200003c0]}, 0x10) 22:11:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10871f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:40 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2b00000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c01e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xe]}, 0x10) 22:11:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104a12, &(0x7f0000000300)) 22:11:41 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x7000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x3400, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109008, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100010, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x18000000]}, 0x10) 22:11:42 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xf0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ce0e, &(0x7f0000000300)) 22:11:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x1000000]}, 0x10) 22:11:43 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2c00, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1472.296444] kauditd_printk_skb: 134 callbacks suppressed [ 1472.296470] audit: type=1400 audit(1541110302.932:39754): avc: denied { map } for pid=4542 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1472.502422] audit: type=1400 audit(1541110302.982:39755): avc: denied { map } for pid=4542 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xb00000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1472.611243] audit: type=1400 audit(1541110303.032:39756): avc: denied { map } for pid=4542 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10270a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10000c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1472.736303] audit: type=1400 audit(1541110303.032:39757): avc: denied { map } for pid=4542 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1472.892478] audit: type=1400 audit(1541110303.092:39758): avc: denied { map } for pid=4542 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100004, &(0x7f0000000300)) [ 1473.039692] audit: type=1400 audit(1541110303.102:39759): avc: denied { map } for pid=4542 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x2000]}, 0x10) [ 1473.138302] audit: type=1400 audit(1541110303.162:39760): avc: denied { map } for pid=4542 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1473.259758] audit: type=1400 audit(1541110303.172:39761): avc: denied { map } for pid=4542 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:43 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x800e, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1473.407660] audit: type=1400 audit(1541110303.292:39762): avc: denied { map } for pid=4554 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1473.562932] audit: type=1400 audit(1541110303.292:39763): avc: denied { map } for pid=4554 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10801e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xc003002000000000]}, 0x10) 22:11:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d91b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:44 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3c00, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x4002000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c816, &(0x7f0000000300)) 22:11:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x40020000]}, 0x10) 22:11:45 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x6, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104001, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a414, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:46 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88ffffff00000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x20000000]}, 0x10) 22:11:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10cd0f, &(0x7f0000000300)) 22:11:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x40020000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10000d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:47 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4888, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xe000000]}, 0x10) 22:11:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100d1d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107506, &(0x7f0000000300)) [ 1477.320009] kauditd_printk_skb: 129 callbacks suppressed [ 1477.320023] audit: type=1400 audit(1541110307.962:39893): avc: denied { map } for pid=4644 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:48 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x89ffffff00000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1477.507121] audit: type=1400 audit(1541110308.012:39894): avc: denied { map } for pid=4643 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x3]}, 0x10) 22:11:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10001d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1477.753386] audit: type=1400 audit(1541110308.022:39895): avc: denied { map } for pid=4650 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1477.917964] audit: type=1400 audit(1541110308.022:39896): avc: denied { map } for pid=4650 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1478.091551] audit: type=1400 audit(1541110308.032:39897): avc: denied { map } for pid=4643 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x100000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1478.269553] audit: type=1400 audit(1541110308.032:39898): avc: denied { map } for pid=4644 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1478.449758] audit: type=1400 audit(1541110308.032:39899): avc: denied { map } for pid=4644 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:49 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8035000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10731e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108019, &(0x7f0000000300)) [ 1478.692588] audit: type=1400 audit(1541110308.062:39900): avc: denied { map } for pid=4650 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x91ffffff]}, 0x10) [ 1478.859663] audit: type=1400 audit(1541110308.072:39901): avc: denied { map } for pid=4650 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1478.980976] audit: type=1400 audit(1541110308.092:39902): avc: denied { map } for pid=4644 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:49 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x30, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108002, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x700000000000000]}, 0x10) 22:11:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107910, &(0x7f0000000300)) 22:11:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xc00000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:50 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x21, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108d05, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x18020000]}, 0x10) 22:11:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104005, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8100, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104c0f, &(0x7f0000000300)) 22:11:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108510, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xa]}, 0x10) 22:11:52 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x800e000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10400f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x600000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xff0f000000000000]}, 0x10) 22:11:52 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfdffffff, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ed0b, &(0x7f0000000300)) 22:11:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10000b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1482.355418] kauditd_printk_skb: 137 callbacks suppressed [ 1482.355433] audit: type=1400 audit(1541110312.992:40040): avc: denied { map } for pid=4752 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1482.478352] audit: type=1400 audit(1541110313.022:40041): avc: denied { map } for pid=4752 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1482.610831] audit: type=1400 audit(1541110313.052:40042): avc: denied { map } for pid=4752 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1482.804293] audit: type=1400 audit(1541110313.082:40043): avc: denied { map } for pid=4752 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100016, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1482.939264] audit: type=1400 audit(1541110313.082:40044): avc: denied { map } for pid=4752 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xffffff91]}, 0x10) 22:11:53 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8060000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1483.078360] audit: type=1400 audit(1541110313.162:40045): avc: denied { map } for pid=4752 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1483.219664] audit: type=1400 audit(1541110313.172:40046): avc: denied { map } for pid=4752 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xbe80, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1483.339665] audit: type=1400 audit(1541110313.512:40047): avc: denied { map } for pid=4762 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1483.440798] audit: type=1400 audit(1541110313.522:40048): avc: denied { map } for pid=4763 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1483.578891] audit: type=1400 audit(1541110313.532:40049): avc: denied { map } for pid=4762 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10cf1b, &(0x7f0000000300)) 22:11:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x733a663f00000000]}, 0x10) 22:11:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108003, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a905, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:54 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3a00, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x4603000000000000]}, 0x10) 22:11:55 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3000000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100805, &(0x7f0000000300)) 22:11:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10400e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x4180, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10331d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:56 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfeffffff, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x500000000000000]}, 0x10) 22:11:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c01b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10700f, &(0x7f0000000300)) 22:11:57 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3f000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x3000000]}, 0x10) 22:11:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101f12, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x34, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:11:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10401c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:57 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88480000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:11:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x50000]}, 0x10) 22:11:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104007, &(0x7f0000000300)) [ 1487.501910] kauditd_printk_skb: 140 callbacks suppressed [ 1487.501925] audit: type=1400 audit(1541110318.142:40190): avc: denied { map } for pid=4864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1487.642236] audit: type=1400 audit(1541110318.142:40191): avc: denied { map } for pid=4864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1487.780166] audit: type=1400 audit(1541110318.142:40192): avc: denied { map } for pid=4864 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108a1d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2000000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1487.941002] audit: type=1400 audit(1541110318.172:40193): avc: denied { map } for pid=4864 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1488.065706] audit: type=1400 audit(1541110318.242:40194): avc: denied { map } for pid=4864 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x2000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1488.215744] audit: type=1400 audit(1541110318.282:40195): avc: denied { map } for pid=4864 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x346]}, 0x10) [ 1488.384209] audit: type=1400 audit(1541110318.312:40196): avc: denied { map } for pid=4864 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10401e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1488.551167] audit: type=1400 audit(1541110318.352:40197): avc: denied { map } for pid=4864 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:59 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1100000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1488.721901] audit: type=1400 audit(1541110318.372:40198): avc: denied { map } for pid=4864 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10cb19, &(0x7f0000000300)) [ 1488.877141] audit: type=1400 audit(1541110318.422:40199): avc: denied { map } for pid=4864 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:11:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10351d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:11:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x240]}, 0x10) 22:12:00 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x29000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x4000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c017, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102912, &(0x7f0000000300)) 22:12:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x4703]}, 0x10) 22:12:01 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2900, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d717, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x300]}, 0x10) 22:12:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10801c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:01 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x800000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xf00, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10bc04, &(0x7f0000000300)) 22:12:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10000d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:02 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88ffffff, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x100000000000000]}, 0x10) 22:12:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c002, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1492.512825] kauditd_printk_skb: 159 callbacks suppressed [ 1492.512841] audit: type=1400 audit(1541110323.142:40359): avc: denied { map } for pid=4965 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:03 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x86ddffff00000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1492.674414] audit: type=1400 audit(1541110323.162:40360): avc: denied { map } for pid=4965 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1492.821095] audit: type=1400 audit(1541110323.202:40361): avc: denied { map } for pid=4961 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10801e, &(0x7f0000000300)) 22:12:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10970d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1492.963216] audit: type=1400 audit(1541110323.202:40362): avc: denied { map } for pid=4965 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x4000000000000000]}, 0x10) [ 1493.080819] audit: type=1400 audit(1541110323.222:40363): avc: denied { map } for pid=4965 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x7, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1493.181611] audit: type=1400 audit(1541110323.222:40364): avc: denied { map } for pid=4961 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1493.319653] audit: type=1400 audit(1541110323.892:40365): avc: denied { map } for pid=4982 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:04 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x100000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1493.420438] audit: type=1400 audit(1541110323.892:40366): avc: denied { map } for pid=4982 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1493.549698] audit: type=1400 audit(1541110323.892:40367): avc: denied { map } for pid=4982 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108019, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1493.686911] audit: type=1400 audit(1541110323.892:40368): avc: denied { map } for pid=4982 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x400000000000000]}, 0x10) 22:12:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x105010, &(0x7f0000000300)) 22:12:04 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8906000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x10000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100511, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:05 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x89ffffff, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xff0f0000]}, 0x10) 22:12:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c016, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101b1e, &(0x7f0000000300)) 22:12:06 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2b000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c41e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x46030000]}, 0x10) 22:12:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x4000000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108011, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:07 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x29, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104608, &(0x7f0000000300)) 22:12:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x18]}, 0x10) 22:12:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106101, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10000e, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:08 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfeffffff00000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xe000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) [ 1497.520901] kauditd_printk_skb: 143 callbacks suppressed [ 1497.520917] audit: type=1400 audit(1541110328.162:40512): avc: denied { map } for pid=5071 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xe803000000000000]}, 0x10) [ 1497.622815] audit: type=1400 audit(1541110328.212:40513): avc: denied { map } for pid=5071 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1497.739665] audit: type=1400 audit(1541110328.232:40514): avc: denied { map } for pid=5071 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c01d, &(0x7f0000000300)) [ 1497.883634] audit: type=1400 audit(1541110328.232:40515): avc: denied { map } for pid=5071 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1498.049228] audit: type=1400 audit(1541110328.682:40516): avc: denied { map } for pid=5085 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:08 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xf0ffff, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1498.180409] audit: type=1400 audit(1541110328.722:40517): avc: denied { map } for pid=5085 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ed1c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1498.305976] audit: type=1400 audit(1541110328.742:40518): avc: denied { map } for pid=5085 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x733a663f]}, 0x10) [ 1498.485472] audit: type=1400 audit(1541110328.762:40519): avc: denied { map } for pid=5085 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1498.673715] audit: type=1400 audit(1541110328.852:40520): avc: denied { map } for pid=5085 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1498.775909] audit: type=1400 audit(1541110328.882:40521): avc: denied { map } for pid=5085 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10800c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:09 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3580, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10611e, &(0x7f0000000300)) 22:12:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xc0030020]}, 0x10) 22:12:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0xf, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10f209, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:10 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x80350000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x1800]}, 0x10) 22:12:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c015, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100058, &(0x7f0000000300)) 22:12:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xb000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x4]}, 0x10) 22:12:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x109d0a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x800000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10801a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:11 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x200000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10981f, &(0x7f0000000300)) 22:12:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xa00000000000000]}, 0x10) 22:12:12 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x300000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10801b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103c19, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xe8030000]}, 0x10) 22:12:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x6000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:13 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1400000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1502.659153] kauditd_printk_skb: 137 callbacks suppressed [ 1502.659168] audit: type=1400 audit(1541110333.292:40659): avc: denied { map } for pid=5191 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x103c0e, &(0x7f0000000300)) [ 1502.850164] audit: type=1400 audit(1541110333.322:40660): avc: denied { map } for pid=5190 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1502.979757] audit: type=1400 audit(1541110333.322:40661): avc: denied { map } for pid=5190 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1503.096608] audit: type=1400 audit(1541110333.322:40662): avc: denied { map } for pid=5190 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1503.278168] audit: type=1400 audit(1541110333.352:40663): avc: denied { map } for pid=5191 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c019, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x40000000]}, 0x10) 22:12:14 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8847000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1503.461002] audit: type=1400 audit(1541110333.352:40664): avc: denied { map } for pid=5191 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1503.638277] audit: type=1400 audit(1541110333.352:40665): avc: denied { map } for pid=5191 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1503.789664] audit: type=1400 audit(1541110333.362:40666): avc: denied { map } for pid=5190 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10cb0b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1503.919959] audit: type=1400 audit(1541110333.412:40668): avc: denied { map } for pid=5191 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1504.036526] audit: type=1400 audit(1541110333.412:40667): avc: denied { map } for pid=5190 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:14 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x86ddffff, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x900000000000000, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x5000000]}, 0x10) 22:12:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10690a, &(0x7f0000000300)) 22:12:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104013, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:15 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x21000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100b02, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0xfeffffff]}, 0x10) 22:12:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c004, &(0x7f0000000300)) 22:12:16 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x347]}, 0x10) 22:12:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x80be, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108005, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x101b1a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:17 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xf000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ac06, &(0x7f0000000300)) 22:12:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x600000000000000]}, 0x10) 22:12:17 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108013, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'d%bug_want_extra_isize'}}]}) 22:12:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x8041, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xa00]}, 0x10) [ 1507.813856] kauditd_printk_skb: 155 callbacks suppressed [ 1507.813871] audit: type=1400 audit(1541110338.452:40824): avc: denied { map } for pid=5299 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10e814, &(0x7f0000000300)) 22:12:18 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2100000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1507.960715] audit: type=1400 audit(1541110338.462:40825): avc: denied { map } for pid=5299 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1508.112096] audit: type=1400 audit(1541110338.472:40826): avc: denied { map } for pid=5299 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1508.241339] audit: type=1400 audit(1541110338.482:40827): avc: denied { map } for pid=5299 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1508.377905] audit: type=1400 audit(1541110338.522:40828): avc: denied { map } for pid=5299 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1508.450927] EXT4-fs (sda1): Unrecognized mount option "d%bug_want_extra_isize=0x0000000000000000" or missing value [ 1508.522964] audit: type=1400 audit(1541110338.562:40829): avc: denied { map } for pid=5299 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10001a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x5]}, 0x10) [ 1508.692487] EXT4-fs (sda1): Unrecognized mount option "d%bug_want_extra_isize=0x0000000000000000" or missing value [ 1508.693616] audit: type=1400 audit(1541110338.572:40830): avc: denied { map } for pid=5299 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'de%ug_want_extra_isize'}}]}) 22:12:19 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2f00, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1508.874089] audit: type=1400 audit(1541110338.622:40831): avc: denied { map } for pid=5299 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1509.052442] audit: type=1400 audit(1541110338.642:40832): avc: denied { map } for pid=5299 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1509.188160] audit: type=1400 audit(1541110338.682:40833): avc: denied { map } for pid=5299 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b016, &(0x7f0000000300)) 22:12:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x3e8, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xffffff91]}, 0x10) 22:12:20 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3f00, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1509.691933] EXT4-fs (sda1): Unrecognized mount option "de%ug_want_extra_isize=0x0000000000000000" or missing value 22:12:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10801f, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_wan%_extra_isize'}}]}) 22:12:20 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x300, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x4703000000000000]}, 0x10) 22:12:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10801b, &(0x7f0000000300)) [ 1510.920144] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 22:12:21 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x81000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x13, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100009, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1511.093790] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 22:12:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_%xtra_isize'}}]}) 22:12:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x7000000]}, 0x10) 22:12:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3a000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108e01, &(0x7f0000000300)) 22:12:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100025, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x46030000]}, 0x10) [ 1512.194712] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value 22:12:23 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x6000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize'}}]}) 22:12:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x15}, 0x4}, 0x1c) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) 22:12:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x107e0d, &(0x7f0000000300)) 22:12:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x20000000]}, 0x10) 22:12:23 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88470000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100014, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1513.175865] kauditd_printk_skb: 155 callbacks suppressed [ 1513.175881] audit: type=1400 audit(1541110343.812:40989): avc: denied { map } for pid=5414 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.332975] audit: type=1400 audit(1541110343.872:40990): avc: denied { map } for pid=5414 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.424676] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000000000" or missing value [ 1513.452937] audit: type=1400 audit(1541110343.872:40991): avc: denied { map } for pid=5414 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.564363] audit: type=1400 audit(1541110343.872:40992): avc: denied { map } for pid=5414 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.701140] audit: type=1400 audit(1541110343.922:40993): avc: denied { map } for pid=5414 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1513.822726] audit: type=1400 audit(1541110343.972:40994): avc: denied { map } for pid=5414 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x300]}, 0x10) 22:12:24 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x806, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1513.995998] audit: type=1400 audit(1541110344.012:40995): avc: denied { map } for pid=5414 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_ilize'}}]}) [ 1514.155287] audit: type=1400 audit(1541110344.072:40996): avc: denied { map } for pid=5414 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) flistxattr(r0, &(0x7f0000000280)=""/155, 0x9b) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='dctcp-reno\x00', 0xfffffffffffffe22) recvfrom(r0, &(0x7f0000000100)=""/101, 0x65, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) socket$inet_tcp(0x2, 0x1, 0x0) [ 1514.353365] audit: type=1400 audit(1541110344.082:40997): avc: denied { map } for pid=5414 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108007, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108f01, &(0x7f0000000300)) [ 1514.503832] audit: type=1400 audit(1541110344.152:40998): avc: denied { map } for pid=5414 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x240]}, 0x10) 22:12:25 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8906, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1515.054804] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000000" or missing value 22:12:25 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1515.338275] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000000" or missing value 22:12:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x18]}, 0x10) 22:12:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i.ize'}}]}) 22:12:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104003, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104f1e, &(0x7f0000000300)) 22:12:26 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8864000000000000, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) r1 = dup2(r0, r0) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f00000001c0)=""/87, &(0x7f00000000c0)=0x57) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x100000001, 0x4000) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000380)={{0x2, 0x2, 0x2, 0x3, 0xa60c}, 0x80, 0x80, 'id0\x00', 'timer0\x00', 0x0, 0x9, 0xeb5, 0x7, 0x80000001}) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='veno\x00', 0x5) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) mq_timedsend(r3, &(0x7f0000000480)="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", 0x1a1, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x500000000000000]}, 0x10) [ 1516.425674] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000000000" or missing value 22:12:27 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1516.653676] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000000000" or missing value 22:12:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i%ize'}}]}) 22:12:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c009, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x5000000000000]}, 0x10) 22:12:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100f0c, &(0x7f0000000300)) 22:12:28 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:28 executing program 3: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)='map_files\x00') setsockopt$inet_dccp_int(r1, 0x21, 0x6, &(0x7f0000000280)=0x2, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom(r2, &(0x7f0000000040)=""/120, 0x78, 0x10000, &(0x7f00000001c0)=@pppoe={0x18, 0x0, {0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'yam0\x00'}}, 0x80) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r2, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r2, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r2, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100015, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1517.841925] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000000000" or missing value 22:12:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xf401000000000000]}, 0x10) 22:12:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i*ize'}}]}) 22:12:28 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x7ffff, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100b02, &(0x7f0000000300)) [ 1518.446618] kauditd_printk_skb: 143 callbacks suppressed [ 1518.446634] audit: type=1400 audit(1541110349.082:41142): avc: denied { map } for pid=5529 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1518.629063] audit: type=1400 audit(1541110349.082:41143): avc: denied { map } for pid=5529 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x600]}, 0x10) 22:12:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100019, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1518.817737] audit: type=1400 audit(1541110349.122:41144): avc: denied { map } for pid=5529 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:29 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x2, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1518.964846] audit: type=1400 audit(1541110349.122:41145): avc: denied { map } for pid=5529 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1519.086831] audit: type=1400 audit(1541110349.172:41146): avc: denied { map } for pid=5529 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1519.247611] audit: type=1400 audit(1541110349.202:41147): avc: denied { map } for pid=5529 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1519.354960] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000000000" or missing value 22:12:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x3d8, 0x20000000, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000080)=""/101, 0x3a5, 0x0, 0x0, 0xfffffffffffffeee) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000280)={{0x7, 0x4, 0x2, 0x3, 'syz1\x00', 0x5}, 0x1, [0xd2, 0xfffffffffffff155, 0x1f, 0x6, 0x1, 0x2, 0x5, 0xfffffffffffffffd, 0x1ff, 0x4, 0x3ff, 0x2, 0x1, 0xffffffffffffffe0, 0x2, 0x0, 0x1e38, 0x8001, 0x7ff, 0x9, 0x1, 0x80000001, 0x3, 0x1, 0xffff, 0x5, 0x2, 0x1, 0x100000000, 0x8, 0x10001, 0xb5d, 0x8, 0x7ff, 0x9, 0x800, 0x7, 0x100, 0x1, 0x4, 0xffffffff00000001, 0x6, 0x7, 0x8, 0x0, 0x9bb2, 0x0, 0x7f, 0x6, 0x7ff, 0x3, 0x7, 0x0, 0x8, 0x7, 0x4, 0x8, 0x10001, 0xffffffffffff0001, 0xfffffffeffffffff, 0xf62d, 0x3c, 0xffffffffffffff07, 0x4, 0x3, 0x3, 0x8, 0x100000000, 0x3, 0x612, 0x3, 0xcfb, 0x8000, 0xfec, 0x6, 0x48014294, 0x200, 0x3, 0x6, 0x1000, 0x1, 0x0, 0x8, 0x9, 0x5000, 0xfffffffffffffffe, 0x9, 0x4, 0x9, 0x0, 0x1ff, 0x83, 0x2, 0xfff, 0x5, 0x1, 0xb1, 0x8, 0x3ff, 0x8, 0xd0b, 0x9, 0x6b87842, 0x1, 0x101, 0x2, 0xe58a, 0x5, 0xff, 0x48, 0x5, 0x7, 0x8000, 0x2, 0xed5, 0xff, 0x7ff, 0x4, 0x30000000, 0x6, 0x8, 0x33, 0x0, 0x8000, 0x1, 0x1, 0xabc, 0x5], {0x0, 0x989680}}) socketpair(0x13, 0x8000e, 0x101, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x2202, 0x80000001, &(0x7f0000000140)=0x3}) [ 1519.410620] audit: type=1400 audit(1541110349.212:41148): avc: denied { map } for pid=5529 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10ea09, &(0x7f0000000300)) [ 1519.576120] audit: type=1400 audit(1541110349.232:41149): avc: denied { map } for pid=5529 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xff0f000000000000]}, 0x10) [ 1519.698174] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000000000" or missing value [ 1519.714209] audit: type=1400 audit(1541110349.232:41150): avc: denied { map } for pid=5529 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:30 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x20000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1519.863548] audit: type=1400 audit(1541110349.322:41151): avc: denied { map } for pid=5537 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i0ize'}}]}) 22:12:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10001b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000640)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000200)={@multicast1, @multicast1}, 0x8) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0xc82, 0x0, 0x1f, 0x14, &(0x7f0000000080)=""/20, 0x33, &(0x7f00000000c0)=""/51, 0x9f, &(0x7f0000000280)=""/159}) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) mq_notify(r1, &(0x7f0000000480)={0x0, 0x11, 0x0, @thr={&(0x7f0000000340)="9d0e2054876512ac", &(0x7f0000000380)="f783088602a51fa0d0ef3a20798e6e38714f2c0d914a4042d5bc5f7ef6591a2f0ef2a4b6628093a7a8ad194bea5e9c6000e93c65b03637ec6513ce36193568e6682621ec1bf638736d94fe4549dc65bc6b0731cb12ff0c1d719d8ea28d5a61106bcf374df166acb6705b3dcf69195c20c0a5644a75dd91eab2eaaac80ebd2eb6b2754ab2bc67ec0738debad0d99a6645b65750a96824986725f72d7f845d309b608b2d0215c9026b62fa22c53d2c96fa8d5ba158cb4f0d2d47ab3ecdace93e0187aa28e0782227b768b96ecfca58a95ee65aecd6ebde8c16fa4ebaa7d93742576414e1475f538600"}}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20084980}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x48, r2, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xe0}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x48}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xff5354a7f7000000]}, 0x10) 22:12:31 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x86ddffff00000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10000a, &(0x7f0000000300)) [ 1520.888058] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000000000" or missing value 22:12:31 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x2b00000000000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1521.163378] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000000000" or missing value 22:12:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x5000000]}, 0x10) 22:12:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108017, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_ioize'}}]}) 22:12:32 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x2b000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10aa0b, &(0x7f0000000300)) 22:12:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2400, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r2, 0x6}, 0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xf401]}, 0x10) 22:12:33 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x8848, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1522.530246] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value 22:12:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10401a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xe00]}, 0x10) 22:12:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i-ize'}}]}) 22:12:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108010, &(0x7f0000000300)) 22:12:34 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0xd00, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1523.489947] kauditd_printk_skb: 163 callbacks suppressed [ 1523.489962] audit: type=1400 audit(1541110354.132:41315): avc: denied { map } for pid=5644 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1523.627640] audit: type=1400 audit(1541110354.132:41316): avc: denied { map } for pid=5644 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1523.767502] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i-ize=0x0000000000000000" or missing value [ 1523.774480] audit: type=1400 audit(1541110354.202:41317): avc: denied { map } for pid=5644 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x4000]}, 0x10) 22:12:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) [ 1523.989724] audit: type=1400 audit(1541110354.202:41318): avc: denied { map } for pid=5644 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_iiize'}}]}) 22:12:34 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1524.089689] audit: type=1400 audit(1541110354.252:41319): avc: denied { map } for pid=5644 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1524.249673] audit: type=1400 audit(1541110354.252:41320): avc: denied { map } for pid=5644 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x104006, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1524.354064] audit: type=1400 audit(1541110354.342:41321): avc: denied { map } for pid=5644 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1524.481982] audit: type=1400 audit(1541110354.352:41322): avc: denied { map } for pid=5644 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10b004, &(0x7f0000000300)) [ 1524.596794] audit: type=1400 audit(1541110354.502:41323): avc: denied { map } for pid=5653 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1524.759664] audit: type=1400 audit(1541110354.502:41324): avc: denied { map } for pid=5653 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x500]}, 0x10) 22:12:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x6, 0x101000) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000380)) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x800, 0x301000) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) futimesat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)={{r3, r4/1000+30000}, {0x77359400}}) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cubic\x00', 0x6) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f00000001c0)=@req3={0x10001, 0x3f, 0xff, 0x9, 0x9, 0x57b, 0xff}, 0x1c) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 22:12:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x608, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1525.193013] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000000" or missing value [ 1525.475993] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000000" or missing value 22:12:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_idize'}}]}) 22:12:36 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x21, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10fff9, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x91ffffff00000000]}, 0x10) 22:12:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10cd05, &(0x7f0000000300)) 22:12:36 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x2000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1526.584232] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000000" or missing value 22:12:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) r1 = memfd_create(&(0x7f0000000040)='vegas\x00', 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080)={@empty, 0x0}, &(0x7f00000000c0)=0x14) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000200)=0xb88, 0x4) bind$bt_hci(r1, &(0x7f00000001c0)={0x1f, r2}, 0xc) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) fsetxattr$security_capability(r0, &(0x7f0000000280)='security.capability\x00', &(0x7f00000002c0)=@v1={0x1000000, [{0x40, 0x1000}]}, 0xc, 0x2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xff0f0000]}, 0x10) 22:12:37 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x14000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1526.783722] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000000" or missing value 22:12:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i+ize'}}]}) 22:12:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a809, &(0x7f0000000300)) 22:12:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10002d, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:38 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x4305, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xc0030020]}, 0x10) 22:12:38 executing program 3: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r1, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) set_robust_list(&(0x7f0000000280)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x3, &(0x7f00000001c0)={&(0x7f0000000180)}}, 0x18) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r1, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x8000006, 0x0, &(0x7f0000000200)) 22:12:38 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0xe80, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10fe1e, &(0x7f0000000300)) [ 1528.191144] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x0000000000000000" or missing value 22:12:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_icize'}}]}) [ 1528.537377] kauditd_printk_skb: 146 callbacks suppressed [ 1528.537394] audit: type=1400 audit(1541110359.172:41471): avc: denied { map } for pid=5759 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108014, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xf4010000]}, 0x10) [ 1528.721946] audit: type=1400 audit(1541110359.222:41472): avc: denied { map } for pid=5759 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:39 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x88a8ffff, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1528.919581] audit: type=1400 audit(1541110359.282:41473): avc: denied { map } for pid=5759 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1529.078844] audit: type=1400 audit(1541110359.282:41474): avc: denied { map } for pid=5759 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1529.224311] audit: type=1400 audit(1541110359.302:41475): avc: denied { map } for pid=5759 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1529.373993] audit: type=1400 audit(1541110359.352:41476): avc: denied { map } for pid=5759 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xf7a75453ff]}, 0x10) [ 1529.499730] audit: type=1400 audit(1541110359.672:41477): avc: denied { map } for pid=5771 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106c05, &(0x7f0000000300)) 22:12:40 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1529.601282] audit: type=1400 audit(1541110359.672:41478): avc: denied { map } for pid=5771 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1529.661583] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000000000" or missing value [ 1529.696169] audit: type=1400 audit(1541110359.712:41479): avc: denied { map } for pid=5771 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100003, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1529.842721] audit: type=1400 audit(1541110359.712:41480): avc: denied { map } for pid=5771 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_AIE_OFF(r1, 0x7002) 22:12:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_i#ize'}}]}) 22:12:40 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x6000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xa]}, 0x10) 22:12:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108112, &(0x7f0000000300)) 22:12:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10001c, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:41 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x88470000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xfeffffff00000000]}, 0x10) [ 1531.220539] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i#ize=0x0000000000000000" or missing value 22:12:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) write$FUSE_INIT(r2, &(0x7f0000000340)={0x50, 0x0, 0x6, {0x7, 0x1b, 0x9, 0x40000, 0x7ff, 0x838, 0x4, 0x4}}, 0x50) r3 = accept4(r1, &(0x7f0000000040)=@ipx, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000001c0)={0x8, 0x1, 0x4, 0x7, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000280)={0x81, 0x1, 0x6, 0x7, r4}, &(0x7f00000002c0)=0x10) 22:12:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_ipize'}}]}) 22:12:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xa00000000000000]}, 0x10) 22:12:42 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x3f00, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x105716, &(0x7f0000000300)) 22:12:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100017, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000040)={{0x5c, @dev={0xac, 0x14, 0x14, 0x17}, 0x4e24, 0x2, 'ovf\x00', 0x2, 0x7ff, 0x55}, {@broadcast, 0x4e20, 0x4, 0x400, 0x5, 0x10001}}, 0x44) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) [ 1532.773440] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value 22:12:43 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x1800]}, 0x10) [ 1533.140712] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value 22:12:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10270f, &(0x7f0000000300)) 22:12:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_iuize'}}]}) [ 1533.307197] IPVS: set_ctl: invalid protocol: 92 172.20.20.23:20004 22:12:44 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x7, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x108016, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1533.558343] IPVS: set_ctl: invalid protocol: 92 172.20.20.23:20004 [ 1533.577285] kauditd_printk_skb: 146 callbacks suppressed [ 1533.577333] audit: type=1400 audit(1541110364.212:41627): avc: denied { map } for pid=5893 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x3e8]}, 0x10) [ 1533.741501] audit: type=1400 audit(1541110364.212:41628): avc: denied { map } for pid=5893 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000280)=""/4096) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) [ 1533.870599] audit: type=1400 audit(1541110364.282:41629): avc: denied { map } for pid=5893 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1533.985190] audit: type=1400 audit(1541110364.292:41630): avc: denied { map } for pid=5893 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:44 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1534.266347] audit: type=1400 audit(1541110364.902:41631): avc: denied { map } for pid=5910 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1534.358796] audit: type=1400 audit(1541110364.902:41632): avc: denied { map } for pid=5912 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10d30c, &(0x7f0000000300)) [ 1534.450840] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iuize=0x0000000000000000" or missing value [ 1534.530152] audit: type=1400 audit(1541110364.902:41633): avc: denied { map } for pid=5912 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_iXize'}}]}) 22:12:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x2]}, 0x10) [ 1534.703397] audit: type=1400 audit(1541110364.942:41634): avc: denied { map } for pid=5910 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e20, @multicast1}, 0x37e) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x10000, 0x0) mq_notify(r1, &(0x7f0000000400)={0x0, 0x1, 0x6, @thr={&(0x7f00000002c0)="8bf42aa2d79f7843e3afae71e002685ab091be7b03cf5464f2b7c819e6c29a486a0c832557698543ce37d6755ba7113b20e37b45c71bd3c1c23dce0a72581546e2a56234f67e214366da916c151b98bab7d24469aa32f0b00a8c3f9928ede85510ad8bfddecdeed532d9035a905a5b2672a0d16fba92423a2175b6991670f6d7bb2d8b1eef476a93763c3f2d995e23002feb1340b0a27b2ae5aaf5d14c4d8cf7d270eac5520e", &(0x7f0000000380)="8e49998152b1d21aae99a328dec13734d4ea65f8777594e69a4d2cac0826af5355a6afb0ddabb4d6b1e5d4893908bafdc153ae2972e78b097108c545b282613d4a5fc1b8ef15bac1"}}) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x800, 0x72000) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000440)=0xfb) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f00000001c0)={0xf, 0x100000000, {0x55, 0x0, 0x1, {0x3, 0x3e01}, {0x80000001, 0xfa}, @period={0x0, 0xff, 0x8, 0xffffffff, 0x8, {0x0, 0x0, 0x0, 0x4}, 0x7, &(0x7f0000000080)=[0x8, 0x8, 0xc2, 0x5, 0x9, 0x7d, 0x9]}}, {0x53, 0x3, 0x4, {0x0, 0x11}, {0x0, 0x7fffffff}, @period={0x0, 0xbe4c, 0x8, 0x20, 0x7, {0x0, 0x62, 0x3, 0x7a}, 0x4, &(0x7f00000000c0)=[0x8000, 0x8, 0x1, 0x8a20]}}}) [ 1534.819668] audit: type=1400 audit(1541110364.942:41635): avc: denied { map } for pid=5912 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10400a, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1534.970948] audit: type=1400 audit(1541110364.942:41636): avc: denied { map } for pid=5910 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:45 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x8864000000000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0xe803000000000000]}, 0x10) 22:12:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10a919, &(0x7f0000000300)) [ 1535.742707] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iXize=0x0000000000000000" or missing value 22:12:46 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0xb00000000000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1535.946205] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iXize=0x0000000000000000" or missing value 22:12:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000001c0), &(0x7f0000000200)=0x30) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_ixize'}}]}) 22:12:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10fffa, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x600000000000000]}, 0x10) 22:12:47 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x21000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x20000000, &(0x7f00000001c0)={0x2, 0x4e20}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0xfffffffffffffe43) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80002, 0x0) setsockopt(r1, 0x6, 0x81, &(0x7f0000000080)="87c793c8a54e6698c58ad317ec9624434c2b9f01e29dd1b9e10020a4d7d2b57b70f1e0d396334c24559c70b9d0d6cb75ebbc37002164958f56011052f3f764642be482a2165a68c7c0549d93114b111b", 0x50) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) 22:12:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100e04, &(0x7f0000000300)) 22:12:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x3f000000]}, 0x10) [ 1537.265818] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000000000" or missing value 22:12:48 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0xffffff84, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isiz%'}}]}) 22:12:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10800b, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 22:12:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x6000000]}, 0x10) 22:12:48 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x3c00000000000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 22:12:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x102f19, &(0x7f0000000300)) [ 1538.518855] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000000" or missing value [ 1538.585603] kauditd_printk_skb: 142 callbacks suppressed [ 1538.585619] audit: type=1400 audit(1541110369.222:41779): avc: denied { map } for pid=6010 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1538.702143] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000000" or missing value [ 1538.729735] audit: type=1400 audit(1541110369.262:41780): avc: denied { map } for pid=6010 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x5e6e89974d6c8f8f, 0x20000000, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000240)={0x77359400}, 0x2d9) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x4000}) sendmsg$key(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x2, 0x16, 0x5, 0xd, 0x14, 0x0, 0x70bd28, 0x25dfdbfd, [@sadb_x_nat_t_type={0x1, 0x14, 0x200}, @sadb_x_nat_t_port={0x1, 0x17, 0x4e21}, @sadb_address={0x3, 0x5, 0x0, 0xa0, 0x0, @in={0x2, 0x4e24, @rand_addr=0x25fb}}, @sadb_address={0x5, 0x17, 0x0, 0xa0, 0x0, @in6={0xa, 0x4e21, 0x7, @mcast1, 0x6}}, @sadb_x_filter={0x5, 0x1a, @in6, @in=@broadcast, 0x13, 0x10, 0x10}, @sadb_address={0x3, 0x6, 0x33, 0xa0, 0x0, @in={0x2, 0x4e20, @remote}}]}, 0xa0}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom(r0, &(0x7f0000000100)=""/101, 0xfffffffffffffec4, 0x0, 0x0, 0xffffffffffffffa5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x840) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000340)) 22:12:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0800000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x100020, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3000000}}]}) [ 1538.869643] audit: type=1400 audit(1541110369.272:41781): avc: denied { map } for pid=6009 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:49 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x3a00000000000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1539.045881] audit: type=1400 audit(1541110369.292:41782): avc: denied { map } for pid=6009 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x4603]}, 0x10) [ 1539.230127] audit: type=1400 audit(1541110369.322:41783): avc: denied { map } for pid=6010 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffffd80", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x106e1e, &(0x7f0000000300)) 22:12:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000080)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000080", &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x10c014, &(0x7f0000000300)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 1539.401604] audit: type=1400 audit(1541110369.322:41784): avc: denied { map } for pid=6010 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1539.480090] audit: type=1400 audit(1541110369.862:41785): avc: denied { map } for pid=6026 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:50 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x8848000000000000, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) [ 1539.557707] audit: type=1400 audit(1541110369.862:41786): avc: denied { map } for pid=6026 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1539.710346] audit: type=1400 audit(1541110369.952:41787): avc: denied { map } for pid=6026 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1539.839947] audit: type=1400 audit(1541110369.952:41788): avc: denied { map } for pid=6026 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:12:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007fc, &(0x7f0000000380)={0x2, 0x0, @loopback, [0x0, 0x0, 0x0, 0x1802]}, 0x10) [ 1539.952107] ================================================================== [ 1539.960405] BUG: KASAN: slab-out-of-bounds in __ext4_expand_extra_isize+0x16f/0x240 [ 1539.968230] Write of size 50331616 at addr ffff8801b057e2a0 by task rs:main Q:Reg/5680 [ 1539.971468] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000003000000, [ 1539.976294] [ 1539.976361] CPU: 1 PID: 5680 Comm: rs:main Q:Reg Not tainted 4.19.0+ #93 [ 1539.976377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1540.002454] Call Trace: [ 1540.005076] dump_stack+0x244/0x39d [ 1540.008728] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1540.014011] ? printk+0xa7/0xcf [ 1540.017348] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1540.022141] print_address_description.cold.7+0x9/0x1ff [ 1540.027540] kasan_report.cold.8+0x242/0x309 [ 1540.031973] ? __ext4_expand_extra_isize+0x16f/0x240 [ 1540.037113] check_memory_region+0x13e/0x1b0 [ 1540.041562] memset+0x23/0x40 [ 1540.044699] __ext4_expand_extra_isize+0x16f/0x240 [ 1540.049653] ext4_mark_inode_dirty+0x8f9/0xb20 [ 1540.054264] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 1540.059218] ? __might_sleep+0x95/0x190 [ 1540.063221] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1540.068815] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 1540.074579] ? __lock_is_held+0xb5/0x140 [ 1540.078669] ? ext4_setattr+0x28f0/0x28f0 [ 1540.082852] ext4_dirty_inode+0x97/0xc0 [ 1540.086925] __mark_inode_dirty+0x7c3/0x1510 [ 1540.091368] ? __inode_attach_wb+0x13f0/0x13f0 [ 1540.096043] ? mark_buffer_dirty+0x1c6/0x8d0 [ 1540.100504] ? __lock_is_held+0xb5/0x140 [ 1540.104628] ? buffer_io_error+0xa0/0xa0 [ 1540.108814] ? wait_for_stable_page+0x1a5/0x570 [ 1540.113515] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1540.119141] ? unlock_page+0x2c2/0x4c0 [ 1540.123058] ? wake_up_page_bit+0x6f0/0x6f0 [ 1540.127422] ? __might_sleep+0x95/0x190 [ 1540.131421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1540.137001] ? __block_commit_write.isra.37+0x301/0x3f0 [ 1540.142439] __generic_write_end+0x320/0x400 [ 1540.146899] ? remove_inode_buffers+0x3f0/0x3f0 [ 1540.151593] ? block_write_end+0xab/0x230 [ 1540.155794] ? page_zero_new_buffers+0x8f0/0x8f0 [ 1540.160596] ? __lock_is_held+0xb5/0x140 [ 1540.164720] generic_write_end+0x6c/0x90 [ 1540.168843] ext4_da_write_end+0x2e0/0xcd0 [ 1540.173117] ? kasan_check_write+0x14/0x20 [ 1540.177383] ? ext4_write_end+0x10c0/0x10c0 [ 1540.181732] ? _copy_to_iter_mcsafe+0x15d0/0x15d0 [ 1540.186592] ? __sanitizer_cov_trace_pc+0x4e/0x50 [ 1540.191589] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 1540.196851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1540.202451] ? timespec64_trunc+0xea/0x180 [ 1540.206748] ? inode_init_owner+0x340/0x340 [ 1540.211188] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 1540.216314] ? ext4_write_end+0x10c0/0x10c0 [ 1540.220662] generic_perform_write+0x4ca/0x6a0 [ 1540.225288] ? add_page_wait_queue+0x400/0x400 [ 1540.229902] ? current_time+0x1b0/0x1b0 [ 1540.233902] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1540.238968] ? generic_write_checks+0x382/0x5d0 [ 1540.243687] ? wait_on_page_locked_killable+0x520/0x520 [ 1540.249103] ? ext4_file_write_iter+0x2a1/0x1420 [ 1540.253905] __generic_file_write_iter+0x26e/0x630 [ 1540.258888] ext4_file_write_iter+0x390/0x1420 [ 1540.263542] ? ext4_file_mmap+0x410/0x410 [ 1540.267741] ? ksys_dup3+0x680/0x680 [ 1540.271497] ? zap_class+0x640/0x640 [ 1540.275289] ? __lock_is_held+0xb5/0x140 [ 1540.279409] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1540.284409] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1540.290010] ? iov_iter_init+0xc2/0x1e0 [ 1540.294058] __vfs_write+0x6b8/0x9f0 [ 1540.297851] ? kernel_read+0x120/0x120 [ 1540.301798] ? __lock_is_held+0xb5/0x140 [ 1540.305923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1540.311509] ? __sb_start_write+0x1b2/0x370 [ 1540.315905] vfs_write+0x1fc/0x560 [ 1540.319519] ksys_write+0x101/0x260 [ 1540.323198] ? __ia32_sys_read+0xb0/0xb0 [ 1540.327315] ? trace_hardirqs_off_caller+0x310/0x310 [ 1540.332482] __x64_sys_write+0x73/0xb0 [ 1540.336443] do_syscall_64+0x1b9/0x820 [ 1540.340392] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1540.345814] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1540.350810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1540.355730] ? trace_hardirqs_on_caller+0x310/0x310 [ 1540.360796] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1540.365875] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1540.370794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1540.376039] RIP: 0033:0x7fc3db40819d [ 1540.379813] Code: d1 20 00 00 75 10 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 be fa ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 07 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1540.398772] RSP: 002b:00007fc3d99a9000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1540.406548] RAX: ffffffffffffffda RBX: 00000000000000f5 RCX: 00007fc3db40819d [ 1540.413872] RDX: 00000000000000f5 RSI: 0000000000ebfa90 RDI: 0000000000000005 [ 1540.421200] RBP: 0000000000ebfa90 R08: 0000000000ebfb75 R09: 00007fc3dad853f7 [ 1540.428527] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1540.435848] R13: 00007fc3d99a9480 R14: 0000000000000002 R15: 0000000000ebf890 [ 1540.443167] [ 1540.444799] The buggy address belongs to the page: [ 1540.449745] page:ffffea0006c15f80 count:2 mapcount:0 mapping:ffff8801cc470658 index:0x427 [ 1540.458849] flags: 0x2fffc000000203a(referenced|dirty|lru|active|private) [ 1540.465821] raw: 02fffc000000203a ffffea0006c6a4c8 ffffea0006ce6108 ffff8801cc470658 [ 1540.473749] raw: 0000000000000427 ffff8801bc688a80 00000002ffffffff ffff8801d9a68dc0 [ 1540.481682] page dumped because: kasan: bad access detected [ 1540.487426] page->mem_cgroup:ffff8801d9a68dc0 [ 1540.491950] [ 1540.493629] Memory state around the buggy address: [ 1540.498591] ffff8801b07fff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1540.505988] ffff8801b07fff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1540.513392] >ffff8801b0800000: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 1540.520782] ^ [ 1540.524162] ffff8801b0800080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1540.531554] ffff8801b0800100: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 1540.538971] ================================================================== [ 1540.546365] Disabling lock debugging due to kernel taint [ 1540.596930] BUG: unable to handle kernel paging request[ 1540.602598] BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 [ 1540.602603] PGD 1c2257067 P4D 1c2257067 PUD 1c5ae0067 PMD 0 [ 1540.602617] Thread overran stack, or stack corrupted [ 1540.602620] Oops: 0010 [#1] PREEMPT SMP KASAN [ 1540.602626] CPU: 1 PID: 30791 Comm: syz-executor2 Tainted: G B 4.19.0+ #93 [ 1540.602633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1540.602636] RIP: 0010: (null) [ 1540.602639] Code: Bad RIP value. [ 1540.602643] RSP: 0018:ffff8801b2e7e1c8 EFLAGS: 00010002 [ 1540.602650] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 1540.602656] RDX: 00000000000003fd RSI: ffffffff83e2cf01 RDI: ffffffff8bae6218 [ 1540.602661] RBP: 0000000000000000 R08: ffff88018d56a6c0 R09: 0000000000000001 [ 1540.602667] R10: ffffed00365cfc36 R11: ffff88018d56a6c0 R12: 0000000000000000 [ 1540.602672] R13: 0000000000000020 R14: 0000000000000000 R15: fffffbfff175cc45 [ 1540.602678] FS: 00007fa6c6efd700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 1540.602683] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1540.602688] CR2: ffffffffffffffd6 CR3: 00000001c4578000 CR4: 00000000001406e0 [ 1540.602694] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1540.602699] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1540.602702] Call Trace: [ 1540.602704] Modules linked in: [ 1540.602710] CR2: 0000000000000000 [ 1540.602812] ---[ end trace e91e659a22d6496a ]--- [ 1540.602816] RIP: 0010: (null) [ 1540.602819] Code: Bad RIP value. [ 1540.602823] RSP: 0018:ffff8801b2e7e1c8 EFLAGS: 00010002 [ 1540.602830] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 1540.602835] RDX: 00000000000003fd RSI: ffffffff83e2cf01 RDI: ffffffff8bae6218 [ 1540.602840] RBP: 0000000000000000 R08: ffff88018d56a6c0 R09: 0000000000000001 [ 1540.602845] R10: ffffed00365cfc36 R11: ffff88018d56a6c0 R12: 0000000000000000 [ 1540.602851] R13: 0000000000000020 R14: 0000000000000000 R15: fffffbfff175cc45 [ 1540.602856] FS: 00007fa6c6efd700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 1540.602861] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1540.602866] CR2: ffffffffffffffd6 CR3: 00000001c4578000 CR4: 00000000001406e0 [ 1540.602872] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1540.602877] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1540.602882] Kernel panic - not syncing: Fatal exception [ 1541.766776] Shutting down cpus with NMI [ 1541.766779] Kernel Offset: disabled